Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-11212 (GCVE-0-2018-11212)
Vulnerability from cvelistv5
Published
2018-05-16 17:00
Modified
2024-08-05 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.817Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106583", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106583" }, { "name": "USN-3706-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3706-2/" }, { "name": "RHSA-2019:0474", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "name": "USN-3706-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3706-1/" }, { "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1638-1] libjpeg-turbo security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "name": "RHSA-2019:0469", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "name": "RHSA-2019:0473", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "name": "RHSA-2019:0472", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "name": "openSUSE-SU-2019:0346", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "name": "RHSA-2019:0640", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "name": "RHSA-2019:1238", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "name": "openSUSE-SU-2019:1439", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1500", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "name": "RHSA-2019:2052", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ijg.org/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T23:19:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "106583", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106583" }, { "name": "USN-3706-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3706-2/" }, { "name": "RHSA-2019:0474", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "name": "USN-3706-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3706-1/" }, { "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1638-1] libjpeg-turbo security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "name": "RHSA-2019:0469", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "name": "RHSA-2019:0473", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "name": "RHSA-2019:0472", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "name": "openSUSE-SU-2019:0346", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "name": "RHSA-2019:0640", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "name": "RHSA-2019:1238", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "name": "openSUSE-SU-2019:1439", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1500", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "name": "RHSA-2019:2052", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ijg.org/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "106583", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106583" }, { "name": "USN-3706-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3706-2/" }, { "name": "RHSA-2019:0474", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "name": "USN-3706-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3706-1/" }, { "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1638-1] libjpeg-turbo security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "name": "RHSA-2019:0469", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "name": "RHSA-2019:0473", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "name": "RHSA-2019:0472", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "name": "openSUSE-SU-2019:0346", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "name": "RHSA-2019:0640", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "name": "RHSA-2019:1238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "name": "openSUSE-SU-2019:1439", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1500", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "name": "RHSA-2019:2052", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190118-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "name": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a", "refsource": "MISC", "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "name": "http://www.ijg.org/", "refsource": "MISC", "url": "http://www.ijg.org/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "name": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git", "refsource": "MISC", "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11212", "datePublished": "2018-05-16T17:00:00", "dateReserved": "2018-05-16T00:00:00", "dateUpdated": "2024-08-05T08:01:52.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-11212\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-05-16T17:29:00.230\",\"lastModified\":\"2024-11-21T03:42:54.727\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en libjpeg 9a y 9d. La funci\u00f3n alloc_sarray en jmemmgr.c permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (error de divisi\u00f3n entre cero) mediante un archivo manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-369\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ijg:libjpeg:9a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B75BB945-23D3-4242-8DD2-CECF91998F3B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF1DFDA-FB66-4CEA-A658-B167326D1D96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*\",\"versionStartIncluding\":\"7.3\",\"matchCriteriaId\":\"6AADE2A6-B78C-4B9C-8FAB-58DB50F69D84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*\",\"versionStartIncluding\":\"9.4\",\"matchCriteriaId\":\"AAEB3A7A-59C9-47C8-B792-343717F1555B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93ADB707-E0A7-4650-AD0C-F28CA3FFC6BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*\",\"matchCriteriaId\":\"1E46A02F-29C1-48C8-B9A5-8800F58CD785\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*\",\"matchCriteriaId\":\"D8668AF8-DA10-45F2-AB8C-432640D52C04\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7DA784-1D92-4139-8336-75FDF68AC78D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*\",\"matchCriteriaId\":\"97115EB3-5516-40D5-9BAA-FE7A3A2F55B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"931DCBC0-12A8-427E-8FBC-E88BCD91F52C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:8.0:update_191:*:*:*:*:*:*\",\"matchCriteriaId\":\"443B5461-681B-445E-B705-010012D4486F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4F86C3C-B99C-44C6-97D7-163DC3F59687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ijg.org/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/106583\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0469\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0472\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0473\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0474\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0640\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1238\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2052\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190118-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3706-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3706-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ijg.org/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/106583\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0469\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0472\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0473\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0474\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:0640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20190118-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3706-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3706-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
suse-su-2019:13978-1
Vulnerability from csaf_suse
Published
2019-03-14 09:38
Modified
2019-03-14 09:38
Summary
Security update for java-1_7_1-ibm
Notes
Title of the patch
Security update for java-1_7_1-ibm
Description of the patch
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
Patchnames
sdksp4-java-1_7_1-ibm-13978,slessp4-java-1_7_1-ibm-13978
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_1-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\n\nMore information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-java-1_7_1-ibm-13978,slessp4-java-1_7_1-ibm-13978", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_13978-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:13978-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201913978-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:13978-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005193.html" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" } ], "title": "Security update for java-1_7_1-ibm", "tracking": { "current_release_date": "2019-03-14T09:38:52Z", "generator": { "date": "2019-03-14T09:38:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:13978-1", "initial_release_date": "2019-03-14T09:38:52Z", "revision_history": [ { "date": "2019-03-14T09:38:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-14T09:38:52Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-26.36.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-26.36.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-14T09:38:52Z", "details": "moderate" } ], "title": "CVE-2019-2422" } ] }
suse-su-2019:13975-1
Vulnerability from csaf_suse
Published
2019-03-12 17:39
Modified
2019-03-12 17:39
Summary
Security update for java-1_7_0-ibm
Notes
Title of the patch
Security update for java-1_7_0-ibm
Description of the patch
This update for java-1_7_0-ibm to version 7.0.10.40 fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
Patchnames
sleposp3-java-1_7_0-ibm-13975
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_0-ibm to version 7.0.10.40 fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\t\n\nMore information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-java-1_7_0-ibm-13975", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_13975-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:13975-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201913975-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:13975-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005189.html" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" } ], "title": "Security update for java-1_7_0-ibm", "tracking": { "current_release_date": "2019-03-12T17:39:36Z", "generator": { "date": "2019-03-12T17:39:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:13975-1", "initial_release_date": "2019-03-12T17:39:36Z", "revision_history": [ { "date": "2019-03-12T17:39:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "product": { "name": "java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "product_id": "java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "product": { "name": "java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "product_id": "java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "product": { "name": "java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "product_id": "java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "product": { "name": "java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "product_id": "java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586", "product": { "name": "java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586", "product_id": "java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586" }, "product_reference": "java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586" }, "product_reference": "java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586" }, "product_reference": "java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586" }, "product_reference": "java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" }, "product_reference": "java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2019-03-12T17:39:36Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-alsa-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-devel-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-jdbc-1.7.0_sr10.40-65.35.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:java-1_7_0-ibm-plugin-1.7.0_sr10.40-65.35.1.i586" ] } ], "threats": [ { "category": "impact", "date": "2019-03-12T17:39:36Z", "details": "moderate" } ], "title": "CVE-2019-2422" } ] }
suse-su-2019:2291-1
Vulnerability from csaf_suse
Published
2019-09-04 14:48
Modified
2019-09-04 14:48
Summary
Security update for java-1_8_0-ibm
Notes
Title of the patch
Security update for java-1_8_0-ibm
Description of the patch
This update for java-1_8_0-ibm fixes the following issues:
Update to Java 8.0 Service Refresh 5 Fix Pack 40.
Security issues fixed:
- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
Patchnames
SUSE-2019-2291,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2291,SUSE-SLE-Module-Legacy-15-2019-2291,SUSE-SLE-Module-Legacy-15-SP1-2019-2291
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\nUpdate to Java 8.0 Service Refresh 5 Fix Pack 40.\n\nSecurity issues fixed:\n\n- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).\n- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).\n- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).\n- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).\n- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).\n- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-2291,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2291,SUSE-SLE-Module-Legacy-15-2019-2291,SUSE-SLE-Module-Legacy-15-SP1-2019-2291", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2291-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2291-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2291-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE Bug 1141780", "url": "https://bugzilla.suse.com/1141780" }, { "category": "self", "summary": "SUSE Bug 1141782", "url": "https://bugzilla.suse.com/1141782" }, { "category": "self", "summary": "SUSE Bug 1141783", "url": "https://bugzilla.suse.com/1141783" }, { "category": "self", "summary": "SUSE Bug 1141785", "url": "https://bugzilla.suse.com/1141785" }, { "category": "self", "summary": "SUSE Bug 1141787", "url": "https://bugzilla.suse.com/1141787" }, { "category": "self", "summary": "SUSE Bug 1141789", "url": "https://bugzilla.suse.com/1141789" }, { "category": "self", "summary": "SUSE Bug 1147021", "url": "https://bugzilla.suse.com/1147021" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11771 page", "url": "https://www.suse.com/security/cve/CVE-2019-11771/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11772 page", "url": "https://www.suse.com/security/cve/CVE-2019-11772/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11775 page", "url": "https://www.suse.com/security/cve/CVE-2019-11775/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2449 page", "url": "https://www.suse.com/security/cve/CVE-2019-2449/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-4473 page", "url": "https://www.suse.com/security/cve/CVE-2019-4473/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2019-09-04T14:48:56Z", "generator": { "date": "2019-09-04T14:48:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2291-1", "initial_release_date": "2019-09-04T14:48:56Z", "revision_history": [ { "date": "2019-09-04T14:48:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-3.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-11771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11771" } ], "notes": [ { "category": "general", "text": "AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11771", "url": "https://www.suse.com/security/cve/CVE-2019-11771" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-11771", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "important" } ], "title": "CVE-2019-11771" }, { "cve": "CVE-2019-11772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11772" } ], "notes": [ { "category": "general", "text": "In Eclipse OpenJ9 prior to 0.15, the String.getBytes(int, int, byte[], int) method does not verify that the provided byte array is non-null nor that the provided index is in bounds when compiled by the JIT. This allows arbitrary writes to any 32-bit address or beyond the end of a byte array within Java code run under a SecurityManager.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11772", "url": "https://www.suse.com/security/cve/CVE-2019-11772" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-11772", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-11772" }, { "cve": "CVE-2019-11775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11775" } ], "notes": [ { "category": "general", "text": "All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11775", "url": "https://www.suse.com/security/cve/CVE-2019-11775" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-11775", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-11775" }, { "cve": "CVE-2019-2449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2449" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2449", "url": "https://www.suse.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "SUSE Bug 1122292 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1122292" }, { "category": "external", "summary": "SUSE Bug 1132734 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1132734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-2449" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-4473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-4473" } ], "notes": [ { "category": "general", "text": "Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-4473", "url": "https://www.suse.com/security/cve/CVE-2019-4473" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-4473", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "important" } ], "title": "CVE-2019-4473" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.40-3.24.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.40-3.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-04T14:48:56Z", "details": "moderate" } ], "title": "CVE-2019-7317" } ] }
suse-su-2019:0574-1
Vulnerability from csaf_suse
Published
2019-03-08 14:23
Modified
2019-03-08 14:23
Summary
Security update for java-1_8_0-openjdk
Notes
Title of the patch
Security update for java-1_8_0-openjdk
Description of the patch
This update for java-1_8_0-openjdk to version jdk8u201 (icedtea 3.11.0) fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
Complete list of changes: https://mail.openjdk.java.net/pipermail/distro-pkg-dev/2019-March/041223.html
Patchnames
SUSE-2019-574,SUSE-SLE-Module-Development-Tools-OBS-15-2019-574,SUSE-SLE-Module-Legacy-15-2019-574,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk to version jdk8u201 (icedtea 3.11.0) fixes the following issues:\n\t \nSecurity issues fixed: \n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\t\n\nComplete list of changes: https://mail.openjdk.java.net/pipermail/distro-pkg-dev/2019-March/041223.html \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-574,SUSE-SLE-Module-Development-Tools-OBS-15-2019-574,SUSE-SLE-Module-Legacy-15-2019-574,SUSE-SLE-Module-Packagehub-Subpackages-15-2019-574", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0574-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0574-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190574-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0574-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005179.html" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2019-03-08T14:23:01Z", "generator": { "date": "2019-03-08T14:23:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0574-1", "initial_release_date": "2019-03-08T14:23:01Z", "revision_history": [ { "date": "2019-03-08T14:23:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.201-3.16.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-3.16.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-3.16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15", "product_id": "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-08T14:23:01Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-demo-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-devel-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-openjdk-headless-1.8.0.201-3.16.1.x86_64", "SUSE Linux Enterprise Module for Package Hub 15:java-1_8_0-openjdk-javadoc-1.8.0.201-3.16.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-03-08T14:23:01Z", "details": "moderate" } ], "title": "CVE-2019-2422" } ] }
suse-su-2019:0585-1
Vulnerability from csaf_suse
Published
2019-03-12 11:59
Modified
2019-03-12 11:59
Summary
Security update for java-1_8_0-ibm
Notes
Title of the patch
Security update for java-1_8_0-ibm
Description of the patch
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292).
More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332
Patchnames
SUSE-2019-585,SUSE-SLE-Module-Legacy-15-2019-585
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:\n\nSecurity issues fixed: \t \n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\n- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).\n- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). \n\nMore information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-585,SUSE-SLE-Module-Legacy-15-2019-585", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0585-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0585-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0585-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190585-1.html" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE Bug 1128158", "url": "https://bugzilla.suse.com/1128158" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1890 page", "url": "https://www.suse.com/security/cve/CVE-2018-1890/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2449 page", "url": "https://www.suse.com/security/cve/CVE-2019-2449/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2019-03-12T11:59:13Z", "generator": { "date": "2019-03-12T11:59:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0585-1", "initial_release_date": "2019-03-12T11:59:13Z", "revision_history": [ { "date": "2019-03-12T11:59:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-3.16.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-12T11:59:13Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-1890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1890" } ], "notes": [ { "category": "general", "text": "IBM SDK, Java Technology Edition Version 8 on the AIX platform uses absolute RPATHs which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 152081.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1890", "url": "https://www.suse.com/security/cve/CVE-2018-1890" }, { "category": "external", "summary": "SUSE Bug 1128158 for CVE-2018-1890", "url": "https://bugzilla.suse.com/1128158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-12T11:59:13Z", "details": "moderate" } ], "title": "CVE-2018-1890" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-12T11:59:13Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2449" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2449", "url": "https://www.suse.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "SUSE Bug 1122292 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1122292" }, { "category": "external", "summary": "SUSE Bug 1132734 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1132734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-alsa-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-devel-1.8.0_sr5.30-3.16.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:java-1_8_0-ibm-plugin-1.8.0_sr5.30-3.16.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-12T11:59:13Z", "details": "moderate" } ], "title": "CVE-2019-2449" } ] }
suse-su-2019:0617-1
Vulnerability from csaf_suse
Published
2019-03-15 12:14
Modified
2019-03-15 12:14
Summary
Security update for java-1_8_0-ibm
Notes
Title of the patch
Security update for java-1_8_0-ibm
Description of the patch
This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).
- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292).
More information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332
Patchnames
SUSE-2019-617,SUSE-OpenStack-Cloud-7-2019-617,SUSE-SLE-SAP-12-SP1-2019-617,SUSE-SLE-SAP-12-SP2-2019-617,SUSE-SLE-SDK-12-SP3-2019-617,SUSE-SLE-SDK-12-SP4-2019-617,SUSE-SLE-SERVER-12-SP1-2019-617,SUSE-SLE-SERVER-12-SP2-2019-617,SUSE-SLE-SERVER-12-SP2-BCL-2019-617,SUSE-SLE-SERVER-12-SP3-2019-617,SUSE-SLE-SERVER-12-SP4-2019-617,SUSE-Storage-4-2019-617
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm to version 8.0.5.30 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\n- CVE-2018-1890: Fixed a local privilege escalation via RPATHs (bsc#1128158).\n- CVE-2019-2449: Fixed a vulnerabilit which could allow remote atackers to delete arbitrary files (bsc#1122292). \n\nMore information: https://www-01.ibm.com/support/docview.wss?uid=ibm10873332\t \n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-617,SUSE-OpenStack-Cloud-7-2019-617,SUSE-SLE-SAP-12-SP1-2019-617,SUSE-SLE-SAP-12-SP2-2019-617,SUSE-SLE-SDK-12-SP3-2019-617,SUSE-SLE-SDK-12-SP4-2019-617,SUSE-SLE-SERVER-12-SP1-2019-617,SUSE-SLE-SERVER-12-SP2-2019-617,SUSE-SLE-SERVER-12-SP2-BCL-2019-617,SUSE-SLE-SERVER-12-SP3-2019-617,SUSE-SLE-SERVER-12-SP4-2019-617,SUSE-Storage-4-2019-617", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0617-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0617-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190617-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0617-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005195.html" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE Bug 1128158", "url": "https://bugzilla.suse.com/1128158" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1890 page", "url": "https://www.suse.com/security/cve/CVE-2018-1890/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2449 page", "url": "https://www.suse.com/security/cve/CVE-2019-2449/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2019-03-15T12:14:42Z", "generator": { "date": "2019-03-15T12:14:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0617-1", "initial_release_date": "2019-03-15T12:14:42Z", "revision_history": [ { "date": "2019-03-15T12:14:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.s390", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.s390", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.s390", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.s390", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-30.46.1.s390x", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-30.46.1.s390x", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-30.46.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-30.46.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-30.46.1.s390x", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-30.46.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.30-30.46.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T12:14:42Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-1890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1890" } ], "notes": [ { "category": "general", "text": "IBM SDK, Java Technology Edition Version 8 on the AIX platform uses absolute RPATHs which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 152081.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1890", "url": "https://www.suse.com/security/cve/CVE-2018-1890" }, { "category": "external", "summary": "SUSE Bug 1128158 for CVE-2018-1890", "url": "https://bugzilla.suse.com/1128158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T12:14:42Z", "details": "moderate" } ], "title": "CVE-2018-1890" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T12:14:42Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2449" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2449", "url": "https://www.suse.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "SUSE Bug 1122292 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1122292" }, { "category": "external", "summary": "SUSE Bug 1132734 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1132734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.30-30.46.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.30-30.46.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-15T12:14:42Z", "details": "moderate" } ], "title": "CVE-2019-2449" } ] }
suse-su-2019:1392-1
Vulnerability from csaf_suse
Published
2019-05-31 08:15
Modified
2019-05-31 08:15
Summary
Security update for java-1_7_0-openjdk
Notes
Title of the patch
Security update for java-1_7_0-openjdk
Description of the patch
This update for java-1_7_0-openjdk fixes the following issues:
Update to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)
Security issues fixed:
- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).
- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).
- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).
- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).
- CVE-2019-2426: Improve web server connections (bsc#1134297).
Bug fixes:
- Please check the package Changelog for detailed information.
Patchnames
SUSE-2019-1392,SUSE-OpenStack-Cloud-7-2019-1392,SUSE-SLE-DESKTOP-12-SP3-2019-1392,SUSE-SLE-DESKTOP-12-SP4-2019-1392,SUSE-SLE-SAP-12-SP1-2019-1392,SUSE-SLE-SAP-12-SP2-2019-1392,SUSE-SLE-SERVER-12-2019-1392,SUSE-SLE-SERVER-12-SP1-2019-1392,SUSE-SLE-SERVER-12-SP2-2019-1392,SUSE-SLE-SERVER-12-SP2-BCL-2019-1392,SUSE-SLE-SERVER-12-SP3-2019-1392,SUSE-SLE-SERVER-12-SP4-2019-1392,SUSE-Storage-4-2019-1392
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_0-openjdk fixes the following issues:\n\nUpdate to 2.6.18 - OpenJDK 7u221 (April 2019 CPU)\n\nSecurity issues fixed:\n\n- CVE-2019-2602: Fixed flaw inside BigDecimal implementation (Component: Libraries) (bsc#1132728).\n- CVE-2019-2684: Fixed flaw inside the RMI registry implementation (bsc#1132732).\n- CVE-2019-2698: Fixed out of bounds access flaw in the 2D component (bsc#1132729).\n- CVE-2019-2422: Fixed memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed a Divide By Zero in alloc_sarray function in jmemmgr.c (bsc#1122299).\n- CVE-2019-2426: Improve web server connections (bsc#1134297).\n\nBug fixes:\n\n- Please check the package Changelog for detailed information.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1392,SUSE-OpenStack-Cloud-7-2019-1392,SUSE-SLE-DESKTOP-12-SP3-2019-1392,SUSE-SLE-DESKTOP-12-SP4-2019-1392,SUSE-SLE-SAP-12-SP1-2019-1392,SUSE-SLE-SAP-12-SP2-2019-1392,SUSE-SLE-SERVER-12-2019-1392,SUSE-SLE-SERVER-12-SP1-2019-1392,SUSE-SLE-SERVER-12-SP2-2019-1392,SUSE-SLE-SERVER-12-SP2-BCL-2019-1392,SUSE-SLE-SERVER-12-SP3-2019-1392,SUSE-SLE-SERVER-12-SP4-2019-1392,SUSE-Storage-4-2019-1392", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1392-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1392-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191392-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1392-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005521.html" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE Bug 1132728", "url": "https://bugzilla.suse.com/1132728" }, { "category": "self", "summary": "SUSE Bug 1132729", "url": "https://bugzilla.suse.com/1132729" }, { "category": "self", "summary": "SUSE Bug 1132732", "url": "https://bugzilla.suse.com/1132732" }, { "category": "self", "summary": "SUSE Bug 1134297", "url": "https://bugzilla.suse.com/1134297" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2698 page", "url": "https://www.suse.com/security/cve/CVE-2019-2698/" } ], "title": "Security update for java-1_7_0-openjdk", "tracking": { "current_release_date": "2019-05-31T08:15:17Z", "generator": { "date": "2019-05-31T08:15:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1392-1", "initial_release_date": "2019-05-31T08:15:17Z", "revision_history": [ { "date": "2019-05-31T08:15:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.aarch64", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.aarch64", "product_id": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.i586" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.i586", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.i586", "product_id": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-javadoc-1.7.0.221-43.22.1.noarch", "product": { "name": "java-1_7_0-openjdk-javadoc-1.7.0.221-43.22.1.noarch", "product_id": "java-1_7_0-openjdk-javadoc-1.7.0.221-43.22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.ppc64le", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.ppc64le", "product_id": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.s390", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.s390", "product_id": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.s390x", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.s390x", "product_id": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-accessibility-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-bootstrap-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-bootstrap-devel-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-bootstrap-headless-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.x86_64", "product": { "name": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.x86_64", "product_id": "java-1_7_0-openjdk-src-1.7.0.221-43.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" }, "product_reference": "java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-31T08:15:17Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-31T08:15:17Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-31T08:15:17Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-31T08:15:17Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-31T08:15:17Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2698" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2698", "url": "https://www.suse.com/security/cve/CVE-2019-2698" }, { "category": "external", "summary": "SUSE Bug 1132729 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1132729" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-demo-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-devel-1.7.0.221-43.22.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_0-openjdk-headless-1.7.0.221-43.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-31T08:15:17Z", "details": "moderate" } ], "title": "CVE-2019-2698" } ] }
suse-su-2019:1219-1
Vulnerability from csaf_suse
Published
2019-05-13 11:27
Modified
2019-05-13 11:27
Summary
Security update for java-1_8_0-openjdk
Notes
Title of the patch
Security update for java-1_8_0-openjdk
Description of the patch
This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:
Security issues fixed:
- CVE-2019-2602: Better String parsing (bsc#1132728).
- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).
- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).
- CVE-2019-2422: Better FileChannel (bsc#1122293).
- CVE-2018-11212: Improve JPEG (bsc#1122299).
Non-Security issue fixed:
- Disable LTO (bsc#1133135).
- Added Japanese new era name.
Patchnames
SUSE-2019-1219,SUSE-OpenStack-Cloud-7-2019-1219,SUSE-SLE-DESKTOP-12-SP3-2019-1219,SUSE-SLE-DESKTOP-12-SP4-2019-1219,SUSE-SLE-SAP-12-SP1-2019-1219,SUSE-SLE-SAP-12-SP2-2019-1219,SUSE-SLE-SERVER-12-SP1-2019-1219,SUSE-SLE-SERVER-12-SP2-2019-1219,SUSE-SLE-SERVER-12-SP2-BCL-2019-1219,SUSE-SLE-SERVER-12-SP3-2019-1219,SUSE-SLE-SERVER-12-SP4-2019-1219,SUSE-Storage-4-2019-1219
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk to version 8u212 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2602: Better String parsing (bsc#1132728).\n- CVE-2019-2684: More dynamic RMI interactions (bsc#1132732).\n- CVE-2019-2698: Fuzzing TrueType fonts - setCurrGlyphID() (bsc#1132729).\n- CVE-2019-2422: Better FileChannel (bsc#1122293).\n- CVE-2018-11212: Improve JPEG (bsc#1122299).\n\nNon-Security issue fixed:\n\n- Disable LTO (bsc#1133135).\n- Added Japanese new era name.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1219,SUSE-OpenStack-Cloud-7-2019-1219,SUSE-SLE-DESKTOP-12-SP3-2019-1219,SUSE-SLE-DESKTOP-12-SP4-2019-1219,SUSE-SLE-SAP-12-SP1-2019-1219,SUSE-SLE-SAP-12-SP2-2019-1219,SUSE-SLE-SERVER-12-SP1-2019-1219,SUSE-SLE-SERVER-12-SP2-2019-1219,SUSE-SLE-SERVER-12-SP2-BCL-2019-1219,SUSE-SLE-SERVER-12-SP3-2019-1219,SUSE-SLE-SERVER-12-SP4-2019-1219,SUSE-Storage-4-2019-1219", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1219-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1219-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191219-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1219-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE Bug 1132728", "url": "https://bugzilla.suse.com/1132728" }, { "category": "self", "summary": "SUSE Bug 1132729", "url": "https://bugzilla.suse.com/1132729" }, { "category": "self", "summary": "SUSE Bug 1132732", "url": "https://bugzilla.suse.com/1132732" }, { "category": "self", "summary": "SUSE Bug 1133135", "url": "https://bugzilla.suse.com/1133135" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2698 page", "url": "https://www.suse.com/security/cve/CVE-2019-2698/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2019-05-13T11:27:16Z", "generator": { "date": "2019-05-13T11:27:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1219-1", "initial_release_date": "2019-05-13T11:27:16Z", "revision_history": [ { "date": "2019-05-13T11:27:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.212-27.32.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.212-27.32.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.212-27.32.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390", "product": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390", "product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390", "product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390", "product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390", "product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390", "product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.212-27.32.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.212-27.32.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2698" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2698", "url": "https://www.suse.com/security/cve/CVE-2019-2698" }, { "category": "external", "summary": "SUSE Bug 1132729 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1132729" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-demo-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-devel-1.8.0.212-27.32.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-openjdk-headless-1.8.0.212-27.32.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-13T11:27:16Z", "details": "important" } ], "title": "CVE-2019-2698" } ] }
suse-su-2019:0604-1
Vulnerability from csaf_suse
Published
2019-03-13 09:45
Modified
2019-03-13 09:45
Summary
Security update for java-1_7_1-ibm
Notes
Title of the patch
Security update for java-1_7_1-ibm
Description of the patch
This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
More information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019
Patchnames
SUSE-2019-604,SUSE-OpenStack-Cloud-7-2019-604,SUSE-SLE-SAP-12-SP1-2019-604,SUSE-SLE-SAP-12-SP2-2019-604,SUSE-SLE-SDK-12-SP3-2019-604,SUSE-SLE-SDK-12-SP4-2019-604,SUSE-SLE-SERVER-12-2019-604,SUSE-SLE-SERVER-12-SP1-2019-604,SUSE-SLE-SERVER-12-SP2-2019-604,SUSE-SLE-SERVER-12-SP2-BCL-2019-604,SUSE-SLE-SERVER-12-SP3-2019-604,SUSE-SLE-SERVER-12-SP4-2019-604,SUSE-Storage-4-2019-604
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_7_1-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_7_1-ibm to version 7.1.4.40 fixes the following issues:\n\nSecurity issues fixed: \n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\t \n\nMore information: https://developer.ibm.com/javasdk/support/security-vulnerabilities/#IBM_Security_Update_February_2019\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-604,SUSE-OpenStack-Cloud-7-2019-604,SUSE-SLE-SAP-12-SP1-2019-604,SUSE-SLE-SAP-12-SP2-2019-604,SUSE-SLE-SDK-12-SP3-2019-604,SUSE-SLE-SDK-12-SP4-2019-604,SUSE-SLE-SERVER-12-2019-604,SUSE-SLE-SERVER-12-SP1-2019-604,SUSE-SLE-SERVER-12-SP2-2019-604,SUSE-SLE-SERVER-12-SP2-BCL-2019-604,SUSE-SLE-SERVER-12-SP3-2019-604,SUSE-SLE-SERVER-12-SP4-2019-604,SUSE-Storage-4-2019-604", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0604-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0604-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190604-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0604-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005190.html" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" } ], "title": "Security update for java-1_7_1-ibm", "tracking": { "current_release_date": "2019-03-13T09:45:05Z", "generator": { "date": "2019-03-13T09:45:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0604-1", "initial_release_date": "2019-03-13T09:45:05Z", "revision_history": [ { "date": "2019-03-13T09:45:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.i586" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.i586", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.i586", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.ppc64le", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.ppc64le", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.ppc64le", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.ppc64le", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.s390", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.s390", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.s390", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.s390", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-32bit-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.40-38.34.1.s390x" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.s390x", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.s390x", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-32bit-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-32bit-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-demo-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-devel-32bit-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-jdbc-32bit-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" } }, { "category": "product_version", "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.x86_64", "product": { "name": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.x86_64", "product_id": "java-1_7_1-ibm-src-1.7.1_sr4.40-38.34.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" }, "product_reference": "java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-13T09:45:05Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Enterprise Storage 4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-alsa-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-devel-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.s390x", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-jdbc-1.7.1_sr4.40-38.34.1.x86_64", "SUSE OpenStack Cloud 7:java-1_7_1-ibm-plugin-1.7.1_sr4.40-38.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-13T09:45:05Z", "details": "moderate" } ], "title": "CVE-2019-2422" } ] }
suse-su-2019:2371-1
Vulnerability from csaf_suse
Published
2019-09-12 11:32
Modified
2019-09-12 11:32
Summary
Security update for java-1_8_0-ibm
Notes
Title of the patch
Security update for java-1_8_0-ibm
Description of the patch
This update for java-1_8_0-ibm fixes the following issues:
Update to Java 8.0 Service Refresh 5 Fix Pack 40.
Security issues fixed:
- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)
- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).
- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).
- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).
- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).
- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).
- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).
Patchnames
HPE-Helion-OpenStack-8-2019-2371,SUSE-2019-2371,SUSE-OpenStack-Cloud-7-2019-2371,SUSE-OpenStack-Cloud-8-2019-2371,SUSE-OpenStack-Cloud-Crowbar-8-2019-2371,SUSE-SLE-SAP-12-SP1-2019-2371,SUSE-SLE-SAP-12-SP2-2019-2371,SUSE-SLE-SAP-12-SP3-2019-2371,SUSE-SLE-SDK-12-SP4-2019-2371,SUSE-SLE-SDK-12-SP5-2019-2371,SUSE-SLE-SERVER-12-SP1-2019-2371,SUSE-SLE-SERVER-12-SP2-2019-2371,SUSE-SLE-SERVER-12-SP2-BCL-2019-2371,SUSE-SLE-SERVER-12-SP3-2019-2371,SUSE-SLE-SERVER-12-SP3-BCL-2019-2371,SUSE-SLE-SERVER-12-SP4-2019-2371,SUSE-SLE-SERVER-12-SP5-2019-2371,SUSE-Storage-4-2019-2371,SUSE-Storage-5-2019-2371
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-ibm", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-ibm fixes the following issues:\n\nUpdate to Java 8.0 Service Refresh 5 Fix Pack 40.\n\nSecurity issues fixed:\n\n- CVE-2019-11771: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-11772: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-11775: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-4473: IBM Security Update July 2019 (bsc#1147021)\n- CVE-2019-7317: Fixed issue inside Component AWT (libpng)(bsc#1141780).\n- CVE-2019-2769: Fixed issue inside Component Utilities (bsc#1141783).\n- CVE-2019-2762: Fixed issue inside Component Utilities (bsc#1141782).\n- CVE-2019-2816: Fixed issue inside Component Networking (bsc#1141785).\n- CVE-2019-2766: Fixed issue inside Component Networking (bsc#1141789).\n- CVE-2019-2786: Fixed issue inside Component Security (bsc#1141787).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2019-2371,SUSE-2019-2371,SUSE-OpenStack-Cloud-7-2019-2371,SUSE-OpenStack-Cloud-8-2019-2371,SUSE-OpenStack-Cloud-Crowbar-8-2019-2371,SUSE-SLE-SAP-12-SP1-2019-2371,SUSE-SLE-SAP-12-SP2-2019-2371,SUSE-SLE-SAP-12-SP3-2019-2371,SUSE-SLE-SDK-12-SP4-2019-2371,SUSE-SLE-SDK-12-SP5-2019-2371,SUSE-SLE-SERVER-12-SP1-2019-2371,SUSE-SLE-SERVER-12-SP2-2019-2371,SUSE-SLE-SERVER-12-SP2-BCL-2019-2371,SUSE-SLE-SERVER-12-SP3-2019-2371,SUSE-SLE-SERVER-12-SP3-BCL-2019-2371,SUSE-SLE-SERVER-12-SP4-2019-2371,SUSE-SLE-SERVER-12-SP5-2019-2371,SUSE-Storage-4-2019-2371,SUSE-Storage-5-2019-2371", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2371-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:2371-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:2371-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE Bug 1141780", "url": "https://bugzilla.suse.com/1141780" }, { "category": "self", "summary": "SUSE Bug 1141782", "url": "https://bugzilla.suse.com/1141782" }, { "category": "self", "summary": "SUSE Bug 1141783", "url": "https://bugzilla.suse.com/1141783" }, { "category": "self", "summary": "SUSE Bug 1141785", "url": "https://bugzilla.suse.com/1141785" }, { "category": "self", "summary": "SUSE Bug 1141787", "url": "https://bugzilla.suse.com/1141787" }, { "category": "self", "summary": "SUSE Bug 1141789", "url": "https://bugzilla.suse.com/1141789" }, { "category": "self", "summary": "SUSE Bug 1147021", "url": "https://bugzilla.suse.com/1147021" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11771 page", "url": "https://www.suse.com/security/cve/CVE-2019-11771/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11772 page", "url": "https://www.suse.com/security/cve/CVE-2019-11772/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11775 page", "url": "https://www.suse.com/security/cve/CVE-2019-11775/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2449 page", "url": "https://www.suse.com/security/cve/CVE-2019-2449/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-4473 page", "url": "https://www.suse.com/security/cve/CVE-2019-4473/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" } ], "title": "Security update for java-1_8_0-ibm", "tracking": { "current_release_date": "2019-09-12T11:32:19Z", "generator": { "date": "2019-09-12T11:32:19Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:2371-1", "initial_release_date": "2019-09-12T11:32:19Z", "revision_history": [ { "date": "2019-09-12T11:32:19Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.i586", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.i586", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.i586", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.i586", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.i586", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.i586", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.i586", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.i586", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.i586", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.i586", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.i586", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.i586", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.ppc64le", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.ppc64le", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.ppc64le", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.ppc64le", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.s390", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.s390", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.s390", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.s390", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-30.54.1.s390x", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-30.54.1.s390x", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-30.54.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.s390x", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.s390x", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-30.54.1.s390x", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-30.54.1.s390x", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-30.54.1.s390x" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.s390x", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.s390x", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-32bit-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-demo-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-devel-32bit-1.8.0_sr5.40-30.54.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.x86_64", "product": { "name": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.x86_64", "product_id": "java-1_8_0-ibm-src-1.8.0_sr5.40-30.54.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" }, "product_reference": "java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-11771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11771" } ], "notes": [ { "category": "general", "text": "AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11771", "url": "https://www.suse.com/security/cve/CVE-2019-11771" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-11771", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "important" } ], "title": "CVE-2019-11771" }, { "cve": "CVE-2019-11772", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11772" } ], "notes": [ { "category": "general", "text": "In Eclipse OpenJ9 prior to 0.15, the String.getBytes(int, int, byte[], int) method does not verify that the provided byte array is non-null nor that the provided index is in bounds when compiled by the JIT. This allows arbitrary writes to any 32-bit address or beyond the end of a byte array within Java code run under a SecurityManager.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11772", "url": "https://www.suse.com/security/cve/CVE-2019-11772" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-11772", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-11772" }, { "cve": "CVE-2019-11775", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11775" } ], "notes": [ { "category": "general", "text": "All builds of Eclipse OpenJ9 prior to 0.15 contain a bug where the loop versioner may fail to privatize a value that is pulled out of the loop by versioning - for example if there is a condition that is moved out of the loop that reads a field we may not privatize the value of that field in the modified copy of the loop allowing the test to see one value of the field and subsequently the loop to see a modified field value without retesting the condition moved out of the loop. This can lead to a variety of different issues but read out of array bounds is one major consequence of these problems.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11775", "url": "https://www.suse.com/security/cve/CVE-2019-11775" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-11775", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-11775" }, { "cve": "CVE-2019-2449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2449" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2449", "url": "https://www.suse.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "SUSE Bug 1122292 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1122292" }, { "category": "external", "summary": "SUSE Bug 1132734 for CVE-2019-2449", "url": "https://bugzilla.suse.com/1132734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-2449" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-4473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-4473" } ], "notes": [ { "category": "general", "text": "Multiple binaries in IBM SDK, Java Technology Edition 7, 7R, and 8 on the AIX platform use insecure absolute RPATHs, which may facilitate code injection and privilege elevation by local users. IBM X-Force ID: 163984.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-4473", "url": "https://www.suse.com/security/cve/CVE-2019-4473" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-4473", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "important" } ], "title": "CVE-2019-4473" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "HPE Helion OpenStack 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "HPE Helion OpenStack 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Enterprise Storage 5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.s390x", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-devel-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 7:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-alsa-1.8.0_sr5.40-30.54.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:java-1_8_0-ibm-plugin-1.8.0_sr5.40-30.54.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-09-12T11:32:19Z", "details": "moderate" } ], "title": "CVE-2019-7317" } ] }
rhsa-2019:0473
Vulnerability from csaf_redhat
Published
2019-03-08 21:21
Modified
2025-08-04 12:07
Summary
Red Hat Security Advisory: java-1.7.1-ibm security update
Notes
Topic
An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 7 to version 7R1 SR4-FP40.
Security Fix(es):
* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 7 to version 7R1 SR4-FP40.\n\nSecurity Fix(es):\n\n* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)\n\n* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0473", "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0473.json" } ], "title": "Red Hat Security Advisory: java-1.7.1-ibm security update", "tracking": { "current_release_date": "2025-08-04T12:07:11+00:00", "generator": { "date": "2025-08-04T12:07:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:0473", "initial_release_date": "2019-03-08T21:21:55+00:00", "revision_history": [ { "date": "2019-03-08T21:21:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-08T21:21:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:07:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_id": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-plugin@1.7.1.4.40-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0473" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-12547", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685611" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12547" }, { "category": "external", "summary": "RHBZ#1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12547", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0473" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()" }, { "cve": "CVE-2019-2422", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665945" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "RHBZ#1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0473" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)" } ] }
rhsa-2019:0474
Vulnerability from csaf_redhat
Published
2019-03-07 15:59
Modified
2025-08-04 12:07
Summary
Red Hat Security Advisory: java-1.7.1-ibm security update
Notes
Topic
An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 7 to version 7R1 SR4-FP40.
Security Fix(es):
* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 7 to version 7R1 SR4-FP40.\n\nSecurity Fix(es):\n\n* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)\n\n* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0474", "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0474.json" } ], "title": "Red Hat Security Advisory: java-1.7.1-ibm security update", "tracking": { "current_release_date": "2025-08-04T12:07:17+00:00", "generator": { "date": "2025-08-04T12:07:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:0474", "initial_release_date": "2019-03-07T15:59:34+00:00", "revision_history": [ { "date": "2019-03-07T15:59:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-07T15:59:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:07:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-plugin@1.7.1.4.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_id": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-plugin@1.7.1.4.40-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_id": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-jdbc@1.7.1.4.40-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_id": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-src@1.7.1.4.40-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_id": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1.7.1.4.40-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_id": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-demo@1.7.1.4.40-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_id": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.1-ibm-devel@1.7.1.4.40-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-07T15:59:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0474" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-12547", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685611" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12547" }, { "category": "external", "summary": "RHBZ#1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12547", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-07T15:59:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0474" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()" }, { "cve": "CVE-2019-2422", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665945" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "RHBZ#1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-07T15:59:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0474" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-demo-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-devel-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-jdbc-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-plugin-1:1.7.1.4.40-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.7.1-ibm-src-1:1.7.1.4.40-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)" } ] }
rhsa-2019:0640
Vulnerability from csaf_redhat
Published
2019-03-25 18:25
Modified
2025-08-04 12:07
Summary
Red Hat Security Advisory: java-1.8.0-ibm security update
Notes
Topic
An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP30.
Security Fix(es):
* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)
* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP30.\n\nSecurity Fix(es):\n\n* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)\n\n* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)\n\n* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0640", "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0640.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2025-08-04T12:07:24+00:00", "generator": { "date": "2025-08-04T12:07:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:0640", "initial_release_date": "2019-03-25T18:25:57+00:00", "revision_history": [ { "date": "2019-03-25T18:25:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-25T18:25:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:07:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.8 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.8::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Satellite58" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-25T18:25:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-12547", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685611" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12547" }, { "category": "external", "summary": "RHBZ#1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12547", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-25T18:25:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()" }, { "cve": "CVE-2018-12549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685717" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: missing null check when accelerating Unsafe calls", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12549" }, { "category": "external", "summary": "RHBZ#1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12549", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-25T18:25:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: missing null check when accelerating Unsafe calls" }, { "cve": "CVE-2019-2422", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665945" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "RHBZ#1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-25T18:25:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)" }, { "cve": "CVE-2019-2449", "discovery_date": "2019-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685601" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "RHBZ#1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2449", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449" }, { "category": "external", "summary": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-25T18:25:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0640" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)" } ] }
rhsa-2019:0469
Vulnerability from csaf_redhat
Published
2019-03-06 21:53
Modified
2025-08-04 12:07
Summary
Red Hat Security Advisory: java-1.8.0-ibm security update
Notes
Topic
An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP30.
Security Fix(es):
* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)
* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP30.\n\nSecurity Fix(es):\n\n* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)\n\n* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)\n\n* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0469", "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0469.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2025-08-04T12:07:05+00:00", "generator": { "date": "2025-08-04T12:07:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:0469", "initial_release_date": "2019-03-06T21:53:31+00:00", "revision_history": [ { "date": "2019-03-06T21:53:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-06T21:53:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:07:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.30-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-06T21:53:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0469" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-12547", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685611" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12547" }, { "category": "external", "summary": "RHBZ#1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12547", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-06T21:53:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0469" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()" }, { "cve": "CVE-2018-12549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685717" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: missing null check when accelerating Unsafe calls", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12549" }, { "category": "external", "summary": "RHBZ#1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12549", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-06T21:53:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0469" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: missing null check when accelerating Unsafe calls" }, { "cve": "CVE-2019-2422", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665945" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "RHBZ#1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-06T21:53:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0469" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)" }, { "cve": "CVE-2019-2449", "discovery_date": "2019-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685601" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "RHBZ#1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2449", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449" }, { "category": "external", "summary": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-06T21:53:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0469" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)" } ] }
rhsa-2019:2052
Vulnerability from csaf_redhat
Published
2019-08-06 14:01
Modified
2025-08-04 12:07
Summary
Red Hat Security Advisory: libjpeg-turbo security update
Notes
Topic
An update for libjpeg-turbo is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg: null pointer dereference in cjpeg (CVE-2016-3616)
* libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service (CVE-2018-14498)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
* libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c (CVE-2018-11213)
* libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c (CVE-2018-11214)
* libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF (CVE-2018-11813)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for libjpeg-turbo is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.\n\nSecurity Fix(es):\n\n* libjpeg: null pointer dereference in cjpeg (CVE-2016-3616)\n\n* libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service (CVE-2018-14498)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\n* libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c (CVE-2018-11213)\n\n* libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c (CVE-2018-11214)\n\n* libjpeg: \"cjpeg\" utility large loop because read_pixel in rdtarga.c mishandles EOF (CVE-2018-11813)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.7 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:2052", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/7.7_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/7.7_release_notes/index" }, { "category": "external", "summary": "1318509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1318509" }, { "category": "external", "summary": "1319661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319661" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1579979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579979" }, { "category": "external", "summary": "1579980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579980" }, { "category": "external", "summary": "1588803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588803" }, { "category": "external", "summary": "1687424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687424" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2052.json" } ], "title": "Red Hat Security Advisory: libjpeg-turbo security update", "tracking": { "current_release_date": "2025-08-04T12:07:19+00:00", "generator": { "date": "2025-08-04T12:07:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:2052", "initial_release_date": "2019-08-06T14:01:51+00:00", "revision_history": [ { "date": "2019-08-06T14:01:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-08-06T14:01:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:07:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "product": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "product_id": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-utils@1.2.90-8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.x86_64", "product": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64", "product_id": "turbojpeg-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=x86_64" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=i686" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.i686", "product": { "name": "turbojpeg-0:1.2.90-8.el7.i686", "product_id": "turbojpeg-0:1.2.90-8.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=i686" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=i686" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.i686", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=i686" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.i686", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=i686" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.src", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=ppc" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.ppc", "product": { "name": "turbojpeg-0:1.2.90-8.el7.ppc", "product_id": "turbojpeg-0:1.2.90-8.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=ppc" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=ppc" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=ppc" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=ppc" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=ppc64" } } }, { "category": "product_version", "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "product": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "product_id": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-utils@1.2.90-8.el7?arch=ppc64" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.ppc64", "product": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64", "product_id": "turbojpeg-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=ppc64" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=ppc64" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=ppc64" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=ppc64" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=s390" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.s390", "product": { "name": "turbojpeg-0:1.2.90-8.el7.s390", "product_id": "turbojpeg-0:1.2.90-8.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=s390" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=s390" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.s390", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=s390" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.s390", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=s390" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=s390x" } } }, { "category": "product_version", "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "product": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "product_id": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-utils@1.2.90-8.el7?arch=s390x" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.s390x", "product": { "name": "turbojpeg-0:1.2.90-8.el7.s390x", "product_id": "turbojpeg-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=s390x" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=s390x" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=s390x" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=s390x" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "product": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "product_id": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-static@1.2.90-8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "product": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "product_id": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-utils@1.2.90-8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "turbojpeg-0:1.2.90-8.el7.ppc64le", "product": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le", "product_id": "turbojpeg-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg@1.2.90-8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "product": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "product_id": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@1.2.90-8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "product": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "product_id": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/turbojpeg-devel@1.2.90-8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "product": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "product_id": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo@1.2.90-8.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "product": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "product_id": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libjpeg-turbo-devel@1.2.90-8.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.src", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64" }, "product_reference": "libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.i686", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.7" }, { "category": "default_component_of", "full_product_name": { "name": "turbojpeg-devel-0:1.2.90-8.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" }, "product_reference": "turbojpeg-devel-0:1.2.90-8.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.7" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aladdin Mubaied" ] } ], "cve": "CVE-2016-3616", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2016-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1319661" } ], "notes": [ { "category": "description", "text": "The cjpeg utility in libjpeg allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or execute arbitrary code via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg: null pointer dereference in cjpeg", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3616" }, { "category": "external", "summary": "RHBZ#1319661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319661" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3616", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3616" } ], "release_date": "2016-03-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-06T14:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2052" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libjpeg: null pointer dereference in cjpeg" }, { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-06T14:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-11213", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579979" } ], "notes": [ { "category": "description", "text": "An out-of-bound read vulnerability has been discovered in libjpeg-turbo when reading one row of pixels of a PGM file. An attacker could use this flaw to crash the application and cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11213" }, { "category": "external", "summary": "RHBZ#1579979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579979" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11213", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11213" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-06T14:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c" }, { "cve": "CVE-2018-11214", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579980" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read vulnerability has been discovered in libjpeg-turbo when reading one row of pixels of a PPM file. An attacker could use this flaw to crash the application and cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11214" }, { "category": "external", "summary": "RHBZ#1579980", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579980" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11214", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11214" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-06T14:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c" }, { "cve": "CVE-2018-11813", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1588803" } ], "notes": [ { "category": "description", "text": "libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg: \"cjpeg\" utility large loop because read_pixel in rdtarga.c mishandles EOF", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of libjpeg as shipped with Red Hat Enterprise Linux 4 and 5. This issue affects the versions of libjpeg-turbe as shipped with Red Hat Enterprise Linux 6 and 7. However, the problem is limited to the \"cjpeg\" utility and does not affect the library itself.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11813" }, { "category": "external", "summary": "RHBZ#1588803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588803" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11813", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11813" } ], "release_date": "2018-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-06T14:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg: \"cjpeg\" utility large loop because read_pixel in rdtarga.c mishandles EOF" }, { "cve": "CVE-2018-14498", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1687424" } ], "notes": [ { "category": "description", "text": "get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-14498" }, { "category": "external", "summary": "RHBZ#1687424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1687424" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-14498", "url": "https://www.cve.org/CVERecord?id=CVE-2018-14498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-14498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14498" } ], "release_date": "2018-07-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-08-06T14:01:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:2052" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Client-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Client-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7ComputeNode-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7ComputeNode-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Server-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Server-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.src", "7Workstation-optional-7.7:libjpeg-turbo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-debuginfo-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-devel-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-static-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:libjpeg-turbo-utils-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-0:1.2.90-8.el7.x86_64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.i686", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.ppc64le", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.s390x", "7Workstation-optional-7.7:turbojpeg-devel-0:1.2.90-8.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service" } ] }
rhsa-2019:0472
Vulnerability from csaf_redhat
Published
2019-03-08 21:21
Modified
2025-08-04 12:06
Summary
Red Hat Security Advisory: java-1.8.0-ibm security update
Notes
Topic
An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP30.
Security Fix(es):
* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)
* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP30.\n\nSecurity Fix(es):\n\n* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)\n\n* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)\n\n* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:0472", "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_0472.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2025-08-04T12:06:58+00:00", "generator": { "date": "2025-08-04T12:06:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:0472", "initial_release_date": "2019-03-08T21:21:46+00:00", "revision_history": [ { "date": "2019-03-08T21:21:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-03-12T23:36:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:06:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.30-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.30-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.30-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.30-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.30-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.30-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.30-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.6.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.6.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.6.Z-Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0472" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-12547", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685611" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12547" }, { "category": "external", "summary": "RHBZ#1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12547", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0472" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()" }, { "cve": "CVE-2018-12549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685717" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: missing null check when accelerating Unsafe calls", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12549" }, { "category": "external", "summary": "RHBZ#1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12549", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0472" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: missing null check when accelerating Unsafe calls" }, { "cve": "CVE-2019-2422", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665945" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "RHBZ#1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0472" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)" }, { "cve": "CVE-2019-2449", "discovery_date": "2019-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685601" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "RHBZ#1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2449", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449" }, { "category": "external", "summary": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-03-08T21:21:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:0472" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Client-7.6.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7ComputeNode-7.6.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Server-7.6.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.30-1jpp.1.el7.x86_64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.ppc64le", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.s390x", "7Workstation-7.6.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.30-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)" } ] }
rhsa-2019:1238
Vulnerability from csaf_redhat
Published
2019-05-16 13:25
Modified
2025-08-04 12:07
Summary
Red Hat Security Advisory: java-1.8.0-ibm security update
Notes
Topic
An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.
This update upgrades IBM Java SE 8 to version 8 SR5-FP35.
Security Fix(es):
* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)
* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)
* Oracle JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) (CVE-2019-2697)
* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698)
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602)
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)
* IBM JDK: Read beyond the end of bytecode array causing JVM crash (CVE-2019-10245)
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)
* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP35.\n\nSecurity Fix(es):\n\n* IBM JDK: buffer overflow in jio_snprintf() and jio_vsnprintf() (CVE-2018-12547)\n\n* IBM JDK: missing null check when accelerating Unsafe calls (CVE-2018-12549)\n\n* Oracle JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D) (CVE-2019-2697)\n\n* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698)\n\n* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)\n\n* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602)\n\n* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)\n\n* IBM JDK: Read beyond the end of bytecode array causing JVM crash (CVE-2019-10245)\n\n* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212)\n\n* Oracle JDK: unspecified vulnerability fixed in 8u201 (Deployment) (CVE-2019-2449)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:1238", "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "external", "summary": "1700440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700440" }, { "category": "external", "summary": "1700447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700447" }, { "category": "external", "summary": "1700564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700564" }, { "category": "external", "summary": "1704480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704480" }, { "category": "external", "summary": "1704799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1238.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2025-08-04T12:07:50+00:00", "generator": { "date": "2025-08-04T12:07:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2019:1238", "initial_release_date": "2019-05-16T13:25:59+00:00", "revision_history": [ { "date": "2019-05-16T13:25:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-05-16T13:25:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:07:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 8 Supplementary", "product": { "name": "Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::supplementary" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.35-3.el8_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "product": { "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "product_id": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.5.35-3.el8_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.35-3.el8_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.35-3.el8_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.35-3.el8_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.35-3.el8_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.35-3.el8_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-headless@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-webstart@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.35-3.el8_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x" }, "product_reference": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le" }, "product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "relates_to_product_reference": "Supplementary-8.0.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64 as a component of Red Hat Enterprise Linux 8 Supplementary", "product_id": "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" }, "product_reference": "java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64", "relates_to_product_reference": "Supplementary-8.0.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2018-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1579973" } ], "notes": [ { "category": "description", "text": "A divide by zero vulnerability has been discovered in libjpeg-turbo in alloc_sarray function of jmemmgr.c file. An attacker could use this vulnerability to cause a denial of service via a crafted file.", "title": "Vulnerability description" }, { "category": "summary", "text": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "RHBZ#1579973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1579973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-11212", "url": "https://www.cve.org/CVERecord?id=CVE-2018-11212" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" } ], "release_date": "2018-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c" }, { "cve": "CVE-2018-12547", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685611" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12547" }, { "category": "external", "summary": "RHBZ#1685611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12547", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12547" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: buffer overflow in jio_snprintf() and jio_vsnprintf()" }, { "cve": "CVE-2018-12549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2019-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685717" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.11.0, the OpenJ9 JIT compiler may incorrectly omit a null check on the receiver object of an Unsafe call when accelerating it.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: missing null check when accelerating Unsafe calls", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the java-1.8.0-ibm package as shipped with Red Hat Satellite 5. However, OpenJ9 is loaded only by taskomatic and Tomcat. These 2 processes are listening on the loopback interface only. This flaw is not known to be remotely exploitable under any supported scenario in Satellite 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12549" }, { "category": "external", "summary": "RHBZ#1685717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12549", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12549" } ], "release_date": "2019-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: missing null check when accelerating Unsafe calls" }, { "cve": "CVE-2019-2422", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1665945" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "RHBZ#1665945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1665945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2422" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290)" }, { "cve": "CVE-2019-2449", "discovery_date": "2019-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1685601" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). The supported version that is affected is Java SE: 8u192. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2449" }, { "category": "external", "summary": "RHBZ#1685601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1685601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2449", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2449" }, { "category": "external", "summary": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixJAVA" } ], "release_date": "2019-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 8u201 (Deployment)" }, { "cve": "CVE-2019-2602", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2019-04-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1700440" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "RHBZ#1700440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700440" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2602", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2602" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2602", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2602" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936)" }, { "cve": "CVE-2019-2684", "discovery_date": "2019-04-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1700564" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "RHBZ#1700564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2684", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2684" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453)" }, { "cve": "CVE-2019-2697", "discovery_date": "2019-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1704480" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2697" }, { "category": "external", "summary": "RHBZ#1704480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2697", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2697" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2697", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2697" }, { "category": "external", "summary": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixJAVA", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixJAVA" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: Unspecified vulnerability fixed in 7u221 and 8u211 (2D)" }, { "cve": "CVE-2019-2698", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2019-04-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1700447" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-2698" }, { "category": "external", "summary": "RHBZ#1700447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1700447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-2698", "url": "https://www.cve.org/CVERecord?id=CVE-2019-2698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-2698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2698" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022)" }, { "cve": "CVE-2019-10245", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-04-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1704799" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 prior to the 0.14.0 release, the Java bytecode verifier incorrectly allows a method to execute past the end of bytecode array causing crashes. Eclipse OpenJ9 v0.14.0 correctly detects this case and rejects the attempted class load.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: Read beyond the end of bytecode array causing JVM crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10245" }, { "category": "external", "summary": "RHBZ#1704799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1704799" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10245", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10245" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10245", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10245" } ], "release_date": "2019-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-05-16T13:25:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:1238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-demo-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-devel-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-headless-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-jdbc-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-plugin-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.s390x", "Supplementary-8.0.0.Z:java-1.8.0-ibm-src-1:1.8.0.5.35-3.el8_0.x86_64", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.ppc64le", "Supplementary-8.0.0.Z:java-1.8.0-ibm-webstart-1:1.8.0.5.35-3.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: Read beyond the end of bytecode array causing JVM crash" } ] }
opensuse-su-2019:0161-1
Vulnerability from csaf_opensuse
Published
2019-03-23 10:55
Modified
2019-03-23 10:55
Summary
Security update for java-11-openjdk
Notes
Title of the patch
Security update for java-11-openjdk
Description of the patch
This update for java-11-openjdk to version 11.0.2+7 fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Better FileChannel transfer performance (bsc#1122293)
- CVE-2019-2426: Improve web server connections
- CVE-2018-11212: Improve JPEG processing (bsc#1122299)
- Better route routing
- Better interface enumeration
- Better interface lists
- Improve BigDecimal support
- Improve robot support
- Better icon support
- Choose printer defaults
- Proper allocation handling
- Initial class initialization
- More reliable p11 transactions
- Improve NIO stability
- Better loading of classloader classes
- Strengthen Windows Access Bridge Support
- Improved data set handling
- Improved LSA authentication
- Libsunmscapi improved interactions
Non-security issues fix:
- Do not resolve by default the added JavaEE modules (bsc#1120431)
- ~2.5% regression on compression benchmark starting with 12-b11
- java.net.http.HttpClient hangs on 204 reply without Content-length 0
- Add additional TeliaSonera root certificate
- Add more ld preloading related info to hs_error file on Linux
- Add test to exercise server-side client hello processing
- AES encrypt performance regression in jdk11b11
- AIX: ProcessBuilder: Piping between created processes does not work.
- AIX: Some class library files are missing the Classpath exception
- AppCDS crashes for some uses with JRuby
- Automate vtable/itable stub size calculation
- BarrierSetC1::generate_referent_check() confuses register allocator
- Better HTTP Redirection
- Catastrophic size_t underflow in BitMap::*_large methods
- Clip.isRunning() may return true after Clip.stop() was called
- Compiler thread creation should be bounded by available space in memory and Code Cache
- com.sun.net.httpserver.HttpServer returns Content-length header for 204 response code
- Default mask register for avx512 instructions
- Delayed starting of debugging via jcmd
- Disable all DES cipher suites
- Disable anon and NULL cipher suites
- Disable unsupported GCs for Zero
- Epsilon alignment adjustments can overflow max TLAB size
- Epsilon elastic TLAB sizing may cause misalignment
- HotSpot update for vm_version.cpp to recognise updated VS2017
- HttpClient does not retrieve files with large sizes over HTTP/1.1
- IIOException 'tEXt chunk length is not proper' on opening png file
- Improve TLS connection stability again
- InitialDirContext ctor sometimes throws NPE if the server has sent a disconnection
- Inspect stack during error reporting
- Instead of circle rendered in appl window, but ellipse is produced JEditor Pane
- Introduce diagnostic flag to abort VM on failed JIT compilation
- Invalid assert(HeapBaseMinAddress > 0) in ReservedHeapSpace::initialize_compressed_heap
- jar has issues with UNC-path arguments for the jar -C parameter [windows]
- java.net.http HTTP client should allow specifying Origin and Referer headers
- java.nio.file.Files.writeString writes garbled UTF-16 instead of UTF-8
- JDK 11.0.1 l10n resource file update
- JDWP Transport Listener: dt_socket thread crash
- JVMTI ResourceExhausted should not be posted in CompilerThread
- LDAPS communication failure with jdk 1.8.0_181
- linux: Poor StrictMath performance due to non-optimized compilation
- Missing synchronization when reading counters for live threads and peak thread count
- NPE in SupportedGroupsExtension
- OpenDataException thrown when constructing CompositeData for StackTraceElement
- Parent class loader may not have a referred ClassLoaderData instance when obtained in Klass::class_in_module_of_loader
- Populate handlers while holding streamHandlerLock
- ppc64: Enable POWER9 CPU detection
- print_location is not reliable enough (printing register info)
- Reconsider default option for ClassPathURLCheck change done in JDK-8195874
- Register to register spill may use AVX 512 move instruction on unsupported platform.
- s390: Use of shift operators not covered by cpp standard
- serviceability/sa/TestUniverse.java#id0 intermittently fails with assert(get_instanceKlass()->is_loaded()) failed: must be at least loaded
- SIGBUS in CodeHeapState::print_names()
- SIGSEGV in MethodArityHistogram() with -XX:+CountCompiledCalls
- Soft reference reclamation race in com.sun.xml.internal.stream.util.ThreadLocalBufferAllocator
- Swing apps are slow if displaying from a remote source to many local displays
- switch jtreg to 4.2b13
- Test library OSInfo.getSolarisVersion cannot determine Solaris version
- TestOptionsWithRanges.java is very slow
- TestOptionsWithRanges.java of '-XX:TLABSize=2147483648' fails intermittently
- The Japanese message of FileNotFoundException garbled
- The 'supported_groups' extension in ServerHellos
- ThreadInfoCompositeData.toCompositeData fails to map ThreadInfo to CompositeData
- TimeZone.getDisplayName given Locale.US doesn't always honor the Locale.
- TLS 1.2 Support algorithm in SunPKCS11 provider
- TLS 1.3 handshake server name indication is missing on a session resume
- TLS 1.3 server fails if ClientHello doesn't have pre_shared_key and psk_key_exchange_modes
- TLS 1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth
- tz: Upgrade time-zone data to tzdata2018g
- Undefined behaviour in ADLC
- Update avx512 implementation
- URLStreamHandler initialization race
- UseCompressedOops requirement check fails fails on 32-bit system
- windows: Update OS detection code to recognize Windows Server 2019
- x86: assert on unbound assembler Labels used as branch targets
- x86: jck tests for ldc2_w bytecode fail
- x86: sharedRuntimeTrig/sharedRuntimeTrans compiled without optimization
- '-XX:OnOutOfMemoryError' uses fork instead of vfork
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-161
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-11-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-11-openjdk to version 11.0.2+7 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-2422: Better FileChannel transfer performance (bsc#1122293)\n- CVE-2019-2426: Improve web server connections\n- CVE-2018-11212: Improve JPEG processing (bsc#1122299)\n- Better route routing\n- Better interface enumeration\n- Better interface lists\n- Improve BigDecimal support\n- Improve robot support\n- Better icon support\n- Choose printer defaults\n- Proper allocation handling\n- Initial class initialization\n- More reliable p11 transactions\n- Improve NIO stability\n- Better loading of classloader classes\n- Strengthen Windows Access Bridge Support\n- Improved data set handling\n- Improved LSA authentication\n- Libsunmscapi improved interactions\n\nNon-security issues fix:\n\n- Do not resolve by default the added JavaEE modules (bsc#1120431)\n- ~2.5% regression on compression benchmark starting with 12-b11\n- java.net.http.HttpClient hangs on 204 reply without Content-length 0\n- Add additional TeliaSonera root certificate\n- Add more ld preloading related info to hs_error file on Linux\n- Add test to exercise server-side client hello processing\n- AES encrypt performance regression in jdk11b11\n- AIX: ProcessBuilder: Piping between created processes does not work.\n- AIX: Some class library files are missing the Classpath exception\n- AppCDS crashes for some uses with JRuby\n- Automate vtable/itable stub size calculation\n- BarrierSetC1::generate_referent_check() confuses register allocator\n- Better HTTP Redirection\n- Catastrophic size_t underflow in BitMap::*_large methods\n- Clip.isRunning() may return true after Clip.stop() was called\n- Compiler thread creation should be bounded by available space in memory and Code Cache\n- com.sun.net.httpserver.HttpServer returns Content-length header for 204 response code\n- Default mask register for avx512 instructions\n- Delayed starting of debugging via jcmd\n- Disable all DES cipher suites\n- Disable anon and NULL cipher suites\n- Disable unsupported GCs for Zero\n- Epsilon alignment adjustments can overflow max TLAB size\n- Epsilon elastic TLAB sizing may cause misalignment\n- HotSpot update for vm_version.cpp to recognise updated VS2017\n- HttpClient does not retrieve files with large sizes over HTTP/1.1\n- IIOException \u0027tEXt chunk length is not proper\u0027 on opening png file\n- Improve TLS connection stability again\n- InitialDirContext ctor sometimes throws NPE if the server has sent a disconnection\n- Inspect stack during error reporting\n- Instead of circle rendered in appl window, but ellipse is produced JEditor Pane\n- Introduce diagnostic flag to abort VM on failed JIT compilation\n- Invalid assert(HeapBaseMinAddress \u003e 0) in ReservedHeapSpace::initialize_compressed_heap\n- jar has issues with UNC-path arguments for the jar -C parameter [windows]\n- java.net.http HTTP client should allow specifying Origin and Referer headers\n- java.nio.file.Files.writeString writes garbled UTF-16 instead of UTF-8\n- JDK 11.0.1 l10n resource file update\n- JDWP Transport Listener: dt_socket thread crash\n- JVMTI ResourceExhausted should not be posted in CompilerThread\n- LDAPS communication failure with jdk 1.8.0_181\n- linux: Poor StrictMath performance due to non-optimized compilation\n- Missing synchronization when reading counters for live threads and peak thread count\n- NPE in SupportedGroupsExtension\n- OpenDataException thrown when constructing CompositeData for StackTraceElement\n- Parent class loader may not have a referred ClassLoaderData instance when obtained in Klass::class_in_module_of_loader\n- Populate handlers while holding streamHandlerLock\n- ppc64: Enable POWER9 CPU detection\n- print_location is not reliable enough (printing register info)\n- Reconsider default option for ClassPathURLCheck change done in JDK-8195874\n- Register to register spill may use AVX 512 move instruction on unsupported platform.\n- s390: Use of shift operators not covered by cpp standard\n- serviceability/sa/TestUniverse.java#id0 intermittently fails with assert(get_instanceKlass()-\u003eis_loaded()) failed: must be at least loaded\n- SIGBUS in CodeHeapState::print_names()\n- SIGSEGV in MethodArityHistogram() with -XX:+CountCompiledCalls\n- Soft reference reclamation race in com.sun.xml.internal.stream.util.ThreadLocalBufferAllocator\n- Swing apps are slow if displaying from a remote source to many local displays\n- switch jtreg to 4.2b13\n- Test library OSInfo.getSolarisVersion cannot determine Solaris version\n- TestOptionsWithRanges.java is very slow\n- TestOptionsWithRanges.java of \u0027-XX:TLABSize=2147483648\u0027 fails intermittently\n- The Japanese message of FileNotFoundException garbled\n- The \u0027supported_groups\u0027 extension in ServerHellos\n- ThreadInfoCompositeData.toCompositeData fails to map ThreadInfo to CompositeData\n- TimeZone.getDisplayName given Locale.US doesn\u0027t always honor the Locale.\n- TLS 1.2 Support algorithm in SunPKCS11 provider\n- TLS 1.3 handshake server name indication is missing on a session resume\n- TLS 1.3 server fails if ClientHello doesn\u0027t have pre_shared_key and psk_key_exchange_modes\n- TLS 1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth\n- tz: Upgrade time-zone data to tzdata2018g\n- Undefined behaviour in ADLC\n- Update avx512 implementation\n- URLStreamHandler initialization race\n- UseCompressedOops requirement check fails fails on 32-bit system\n- windows: Update OS detection code to recognize Windows Server 2019\n- x86: assert on unbound assembler Labels used as branch targets\n- x86: jck tests for ldc2_w bytecode fail\n- x86: sharedRuntimeTrig/sharedRuntimeTrans compiled without optimization\n- \u0027-XX:OnOutOfMemoryError\u0027 uses fork instead of vfork\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-161", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0161-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0161-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y/#ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0161-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y/#ORCDRSEWQ6BJYEU2ZLJO4T4GEPU43V5Y" }, { "category": "self", "summary": "SUSE Bug 1120431", "url": "https://bugzilla.suse.com/1120431" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" } ], "title": "Security update for java-11-openjdk", "tracking": { "current_release_date": "2019-03-23T10:55:18Z", "generator": { "date": "2019-03-23T10:55:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0161-1", "initial_release_date": "2019-03-23T10:55:18Z", "revision_history": [ { "date": "2019-03-23T10:55:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "product": { "name": "java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "product_id": "java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64", "product_id": "java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch" }, "product_reference": "java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:55:18Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:55:18Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:java-11-openjdk-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-accessibility-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-demo-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-devel-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-headless-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-javadoc-11.0.2.0-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-11-openjdk-jmods-11.0.2.0-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-11-openjdk-src-11.0.2.0-lp150.2.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T10:55:18Z", "details": "moderate" } ], "title": "CVE-2019-2426" } ] }
opensuse-su-2024:10873-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-15-openjdk-15.0.4.0-2.1 on GA media
Notes
Title of the patch
java-15-openjdk-15.0.4.0-2.1 on GA media
Description of the patch
These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10873
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-15-openjdk-15.0.4.0-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-15-openjdk-15.0.4.0-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10873", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10873-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-15-openjdk-15.0.4.0-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10873-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-15-openjdk-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64" } }, { "category": "product_version", "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "product": { "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "product_id": "java-15-openjdk-src-15.0.4.0-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-15-openjdk-src-15.0.4.0-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" }, "product_reference": "java-15-openjdk-src-15.0.4.0-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-accessibility-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-demo-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-devel-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-headless-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-javadoc-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-jmods-15.0.4.0-2.1.x86_64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.aarch64", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.ppc64le", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.s390x", "openSUSE Tumbleweed:java-15-openjdk-src-15.0.4.0-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2019:0346-1
Vulnerability from csaf_opensuse
Published
2019-03-23 11:16
Modified
2019-03-23 11:16
Summary
Security update for java-1_8_0-openjdk
Notes
Title of the patch
Security update for java-1_8_0-openjdk
Description of the patch
This update for java-1_8_0-openjdk to version jdk8u201 (icedtea 3.11.0) fixes the following issues:
Security issues fixed:
- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).
- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).
Complete list of changes: https://mail.openjdk.java.net/pipermail/distro-pkg-dev/2019-March/041223.html
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-346
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for java-1_8_0-openjdk", "title": "Title of the patch" }, { "category": "description", "text": "This update for java-1_8_0-openjdk to version jdk8u201 (icedtea 3.11.0) fixes the following issues:\n\t \nSecurity issues fixed: \n\n- CVE-2019-2422: Fixed a memory disclosure in FileChannelImpl (bsc#1122293).\n- CVE-2018-11212: Fixed an issue in alloc_sarray function in jmemmgr.c (bsc#1122299).\t\n\nComplete list of changes: https://mail.openjdk.java.net/pipermail/distro-pkg-dev/2019-March/041223.html \n\nThis update was imported from the SUSE:SLE-15:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-346", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_0346-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:0346-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB/#FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:0346-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB/#FDKUXCDPLO7SR6NRODPJR2SF7OTNKJWB" }, { "category": "self", "summary": "SUSE Bug 1122293", "url": "https://bugzilla.suse.com/1122293" }, { "category": "self", "summary": "SUSE Bug 1122299", "url": "https://bugzilla.suse.com/1122299" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" } ], "title": "Security update for java-1_8_0-openjdk", "tracking": { "current_release_date": "2019-03-23T11:16:01Z", "generator": { "date": "2019-03-23T11:16:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:0346-1", "initial_release_date": "2019-03-23T11:16:01Z", "revision_history": [ { "date": "2019-03-23T11:16:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "product_id": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586" }, "product_reference": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:16:01Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-accessibility-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-demo-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-devel-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-headless-1.8.0.201-lp150.2.12.1.x86_64", "openSUSE Leap 15.0:java-1_8_0-openjdk-javadoc-1.8.0.201-lp150.2.12.1.noarch", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.i586", "openSUSE Leap 15.0:java-1_8_0-openjdk-src-1.8.0.201-lp150.2.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-23T11:16:01Z", "details": "moderate" } ], "title": "CVE-2019-2422" } ] }
opensuse-su-2024:10871-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-11-openjdk-11.0.12.0-3.1 on GA media
Notes
Title of the patch
java-11-openjdk-11.0.12.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10871
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-11-openjdk-11.0.12.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-11-openjdk-11.0.12.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10871", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10871-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2818 page", "url": "https://www.suse.com/security/cve/CVE-2019-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2821 page", "url": "https://www.suse.com/security/cve/CVE-2019-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2977 page", "url": "https://www.suse.com/security/cve/CVE-2019-2977/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2655 page", "url": "https://www.suse.com/security/cve/CVE-2020-2655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2767 page", "url": "https://www.suse.com/security/cve/CVE-2020-2767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2778 page", "url": "https://www.suse.com/security/cve/CVE-2020-2778/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2816 page", "url": "https://www.suse.com/security/cve/CVE-2020-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-11-openjdk-11.0.12.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10871-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "product": { "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "product_id": "java-11-openjdk-src-11.0.12.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-11.0.12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" }, "product_reference": "java-11-openjdk-src-11.0.12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2818" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2818", "url": "https://www.suse.com/security/cve/CVE-2019-2818" }, { "category": "external", "summary": "SUSE Bug 1141788 for CVE-2019-2818", "url": "https://bugzilla.suse.com/1141788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2818" }, { "cve": "CVE-2019-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2821" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2821", "url": "https://www.suse.com/security/cve/CVE-2019-2821" }, { "category": "external", "summary": "SUSE Bug 1141781 for CVE-2019-2821", "url": "https://bugzilla.suse.com/1141781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2821" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2977" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2977", "url": "https://www.suse.com/security/cve/CVE-2019-2977" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2977", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2977" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2655" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2655", "url": "https://www.suse.com/security/cve/CVE-2020-2655" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2655", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2655" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2767" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2767", "url": "https://www.suse.com/security/cve/CVE-2020-2767" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2767", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2767" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2778" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2778", "url": "https://www.suse.com/security/cve/CVE-2020-2778" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2778", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2778" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2816", "url": "https://www.suse.com/security/cve/CVE-2020-2816" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2816", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2816" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-accessibility-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-demo-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-devel-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-headless-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-javadoc-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-jmods-11.0.12.0-3.1.x86_64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.aarch64", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.ppc64le", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.s390x", "openSUSE Tumbleweed:java-11-openjdk-src-11.0.12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2024:10872-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-13-openjdk-13.0.8.0-3.1 on GA media
Notes
Title of the patch
java-13-openjdk-13.0.8.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10872
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-13-openjdk-13.0.8.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-13-openjdk-13.0.8.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10872", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10872-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2825 page", "url": "https://www.suse.com/security/cve/CVE-2018-2825/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2826 page", "url": "https://www.suse.com/security/cve/CVE-2018-2826/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2972 page", "url": "https://www.suse.com/security/cve/CVE-2018-2972/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3150 page", "url": "https://www.suse.com/security/cve/CVE-2018-3150/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3157 page", "url": "https://www.suse.com/security/cve/CVE-2018-3157/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2818 page", "url": "https://www.suse.com/security/cve/CVE-2019-2818/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2821 page", "url": "https://www.suse.com/security/cve/CVE-2019-2821/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2977 page", "url": "https://www.suse.com/security/cve/CVE-2019-2977/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14562 page", "url": "https://www.suse.com/security/cve/CVE-2020-14562/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14573 page", "url": "https://www.suse.com/security/cve/CVE-2020-14573/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2655 page", "url": "https://www.suse.com/security/cve/CVE-2020-2655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2767 page", "url": "https://www.suse.com/security/cve/CVE-2020-2767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2778 page", "url": "https://www.suse.com/security/cve/CVE-2020-2778/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2816 page", "url": "https://www.suse.com/security/cve/CVE-2020-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-13-openjdk-13.0.8.0-3.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10872-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-13-openjdk-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64" } }, { "category": "product_version", "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "product": { "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "product_id": "java-13-openjdk-src-13.0.8.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-13-openjdk-src-13.0.8.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" }, "product_reference": "java-13-openjdk-src-13.0.8.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2825" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2825", "url": "https://www.suse.com/security/cve/CVE-2018-2825" }, { "category": "external", "summary": "SUSE Bug 1090196 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1090196" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2825", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2825" }, { "cve": "CVE-2018-2826", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2826" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2826", "url": "https://www.suse.com/security/cve/CVE-2018-2826" }, { "category": "external", "summary": "SUSE Bug 1090197 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1090197" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2826", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2826" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2972" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2972", "url": "https://www.suse.com/security/cve/CVE-2018-2972" }, { "category": "external", "summary": "SUSE Bug 1101655 for CVE-2018-2972", "url": "https://bugzilla.suse.com/1101655" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2972" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3150" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Utility). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3150", "url": "https://www.suse.com/security/cve/CVE-2018-3150" }, { "category": "external", "summary": "SUSE Bug 1112145 for CVE-2018-3150", "url": "https://bugzilla.suse.com/1112145" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3150" }, { "cve": "CVE-2018-3157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3157" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Sound). The supported version that is affected is Java SE: 11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3157", "url": "https://www.suse.com/security/cve/CVE-2018-3157" }, { "category": "external", "summary": "SUSE Bug 1112149 for CVE-2018-3157", "url": "https://bugzilla.suse.com/1112149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3157" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2818", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2818" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2818", "url": "https://www.suse.com/security/cve/CVE-2019-2818" }, { "category": "external", "summary": "SUSE Bug 1141788 for CVE-2019-2818", "url": "https://bugzilla.suse.com/1141788" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2818" }, { "cve": "CVE-2019-2821", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2821" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 11.0.3 and 12.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2821", "url": "https://www.suse.com/security/cve/CVE-2019-2821" }, { "category": "external", "summary": "SUSE Bug 1141781 for CVE-2019-2821", "url": "https://bugzilla.suse.com/1141781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2821" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2977" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2977", "url": "https://www.suse.com/security/cve/CVE-2019-2977" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2977", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2977" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14562", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14562" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14562", "url": "https://www.suse.com/security/cve/CVE-2020-14562" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14562", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14562" }, { "cve": "CVE-2020-14573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14573" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.7 and 14.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14573", "url": "https://www.suse.com/security/cve/CVE-2020-14573" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14573", "url": "https://bugzilla.suse.com/1174157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14573" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2655" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2655", "url": "https://www.suse.com/security/cve/CVE-2020-2655" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2655", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2655" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2767" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2767", "url": "https://www.suse.com/security/cve/CVE-2020-2767" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2767", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2767" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2778", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2778" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2778", "url": "https://www.suse.com/security/cve/CVE-2020-2778" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2778", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2778" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2816", "url": "https://www.suse.com/security/cve/CVE-2020-2816" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2816", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2816" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-accessibility-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-demo-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-devel-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-headless-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-javadoc-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-jmods-13.0.8.0-3.1.x86_64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.aarch64", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.ppc64le", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.s390x", "openSUSE Tumbleweed:java-13-openjdk-src-13.0.8.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
opensuse-su-2024:10876-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
java-1_8_0-openjdk-1.8.0.302-2.2 on GA media
Notes
Title of the patch
java-1_8_0-openjdk-1.8.0.302-2.2 on GA media
Description of the patch
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10876
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.302-2.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10876", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10876-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10165 page", "url": "https://www.suse.com/security/cve/CVE-2016-10165/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5546 page", "url": "https://www.suse.com/security/cve/CVE-2016-5546/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5547 page", "url": "https://www.suse.com/security/cve/CVE-2016-5547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5548 page", "url": "https://www.suse.com/security/cve/CVE-2016-5548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5549 page", "url": "https://www.suse.com/security/cve/CVE-2016-5549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5552 page", "url": "https://www.suse.com/security/cve/CVE-2016-5552/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9840 page", "url": "https://www.suse.com/security/cve/CVE-2016-9840/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9843 page", "url": "https://www.suse.com/security/cve/CVE-2016-9843/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10053 page", "url": "https://www.suse.com/security/cve/CVE-2017-10053/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10067 page", "url": "https://www.suse.com/security/cve/CVE-2017-10067/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10074 page", "url": "https://www.suse.com/security/cve/CVE-2017-10074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10078 page", "url": "https://www.suse.com/security/cve/CVE-2017-10078/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10081 page", "url": "https://www.suse.com/security/cve/CVE-2017-10081/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10086 page", "url": "https://www.suse.com/security/cve/CVE-2017-10086/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10087 page", "url": "https://www.suse.com/security/cve/CVE-2017-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10089 page", "url": "https://www.suse.com/security/cve/CVE-2017-10089/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10090 page", "url": "https://www.suse.com/security/cve/CVE-2017-10090/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10096 page", "url": "https://www.suse.com/security/cve/CVE-2017-10096/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10101 page", "url": "https://www.suse.com/security/cve/CVE-2017-10101/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10102 page", "url": "https://www.suse.com/security/cve/CVE-2017-10102/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10105 page", "url": "https://www.suse.com/security/cve/CVE-2017-10105/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10107 page", "url": "https://www.suse.com/security/cve/CVE-2017-10107/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10108 page", "url": "https://www.suse.com/security/cve/CVE-2017-10108/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10109 page", "url": "https://www.suse.com/security/cve/CVE-2017-10109/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10110 page", "url": "https://www.suse.com/security/cve/CVE-2017-10110/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10111 page", "url": "https://www.suse.com/security/cve/CVE-2017-10111/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10114 page", "url": "https://www.suse.com/security/cve/CVE-2017-10114/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10115 page", "url": "https://www.suse.com/security/cve/CVE-2017-10115/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10116 page", "url": "https://www.suse.com/security/cve/CVE-2017-10116/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10118 page", "url": "https://www.suse.com/security/cve/CVE-2017-10118/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10125 page", "url": "https://www.suse.com/security/cve/CVE-2017-10125/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10135 page", "url": "https://www.suse.com/security/cve/CVE-2017-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10176 page", "url": "https://www.suse.com/security/cve/CVE-2017-10176/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10193 page", "url": "https://www.suse.com/security/cve/CVE-2017-10193/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10198 page", "url": "https://www.suse.com/security/cve/CVE-2017-10198/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10243 page", "url": "https://www.suse.com/security/cve/CVE-2017-10243/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10274 page", "url": "https://www.suse.com/security/cve/CVE-2017-10274/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10281 page", "url": "https://www.suse.com/security/cve/CVE-2017-10281/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10285 page", "url": "https://www.suse.com/security/cve/CVE-2017-10285/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10295 page", "url": "https://www.suse.com/security/cve/CVE-2017-10295/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10345 page", "url": "https://www.suse.com/security/cve/CVE-2017-10345/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10346 page", "url": "https://www.suse.com/security/cve/CVE-2017-10346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10347 page", "url": "https://www.suse.com/security/cve/CVE-2017-10347/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10348 page", "url": "https://www.suse.com/security/cve/CVE-2017-10348/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10349 page", "url": "https://www.suse.com/security/cve/CVE-2017-10349/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10350 page", "url": "https://www.suse.com/security/cve/CVE-2017-10350/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10355 page", "url": "https://www.suse.com/security/cve/CVE-2017-10355/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10356 page", "url": "https://www.suse.com/security/cve/CVE-2017-10356/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10357 page", "url": "https://www.suse.com/security/cve/CVE-2017-10357/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10388 page", "url": "https://www.suse.com/security/cve/CVE-2017-10388/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3231 page", "url": "https://www.suse.com/security/cve/CVE-2017-3231/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3241 page", "url": "https://www.suse.com/security/cve/CVE-2017-3241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3252 page", "url": "https://www.suse.com/security/cve/CVE-2017-3252/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3253 page", "url": "https://www.suse.com/security/cve/CVE-2017-3253/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3260 page", "url": "https://www.suse.com/security/cve/CVE-2017-3260/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3261 page", "url": "https://www.suse.com/security/cve/CVE-2017-3261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3272 page", "url": "https://www.suse.com/security/cve/CVE-2017-3272/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3289 page", "url": "https://www.suse.com/security/cve/CVE-2017-3289/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3509 page", "url": "https://www.suse.com/security/cve/CVE-2017-3509/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3511 page", "url": "https://www.suse.com/security/cve/CVE-2017-3511/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3512 page", "url": "https://www.suse.com/security/cve/CVE-2017-3512/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3514 page", "url": "https://www.suse.com/security/cve/CVE-2017-3514/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3526 page", "url": "https://www.suse.com/security/cve/CVE-2017-3526/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3533 page", "url": "https://www.suse.com/security/cve/CVE-2017-3533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3539 page", "url": "https://www.suse.com/security/cve/CVE-2017-3539/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3544 page", "url": "https://www.suse.com/security/cve/CVE-2017-3544/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-11212 page", "url": "https://www.suse.com/security/cve/CVE-2018-11212/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13785 page", "url": "https://www.suse.com/security/cve/CVE-2018-13785/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16435 page", "url": "https://www.suse.com/security/cve/CVE-2018-16435/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2579 page", "url": "https://www.suse.com/security/cve/CVE-2018-2579/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2582 page", "url": "https://www.suse.com/security/cve/CVE-2018-2582/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2588 page", "url": "https://www.suse.com/security/cve/CVE-2018-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2599 page", "url": "https://www.suse.com/security/cve/CVE-2018-2599/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2602 page", "url": "https://www.suse.com/security/cve/CVE-2018-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2603 page", "url": "https://www.suse.com/security/cve/CVE-2018-2603/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2618 page", "url": "https://www.suse.com/security/cve/CVE-2018-2618/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2629 page", "url": "https://www.suse.com/security/cve/CVE-2018-2629/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2633 page", "url": "https://www.suse.com/security/cve/CVE-2018-2633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2634 page", "url": "https://www.suse.com/security/cve/CVE-2018-2634/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2637 page", "url": "https://www.suse.com/security/cve/CVE-2018-2637/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2641 page", "url": "https://www.suse.com/security/cve/CVE-2018-2641/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2663 page", "url": "https://www.suse.com/security/cve/CVE-2018-2663/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2677 page", "url": "https://www.suse.com/security/cve/CVE-2018-2677/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2678 page", "url": "https://www.suse.com/security/cve/CVE-2018-2678/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2790 page", "url": "https://www.suse.com/security/cve/CVE-2018-2790/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2794 page", "url": "https://www.suse.com/security/cve/CVE-2018-2794/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2795 page", "url": "https://www.suse.com/security/cve/CVE-2018-2795/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2796 page", "url": "https://www.suse.com/security/cve/CVE-2018-2796/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2797 page", "url": "https://www.suse.com/security/cve/CVE-2018-2797/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2798 page", "url": "https://www.suse.com/security/cve/CVE-2018-2798/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2799 page", "url": "https://www.suse.com/security/cve/CVE-2018-2799/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2800 page", "url": "https://www.suse.com/security/cve/CVE-2018-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2814 page", "url": "https://www.suse.com/security/cve/CVE-2018-2814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2815 page", "url": "https://www.suse.com/security/cve/CVE-2018-2815/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2938 page", "url": "https://www.suse.com/security/cve/CVE-2018-2938/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2940 page", "url": "https://www.suse.com/security/cve/CVE-2018-2940/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2952 page", "url": "https://www.suse.com/security/cve/CVE-2018-2952/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-2973 page", "url": "https://www.suse.com/security/cve/CVE-2018-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3136 page", "url": "https://www.suse.com/security/cve/CVE-2018-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3139 page", "url": "https://www.suse.com/security/cve/CVE-2018-3139/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3149 page", "url": "https://www.suse.com/security/cve/CVE-2018-3149/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3169 page", "url": "https://www.suse.com/security/cve/CVE-2018-3169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3180 page", "url": "https://www.suse.com/security/cve/CVE-2018-3180/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3183 page", "url": "https://www.suse.com/security/cve/CVE-2018-3183/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3214 page", "url": "https://www.suse.com/security/cve/CVE-2018-3214/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2422 page", "url": "https://www.suse.com/security/cve/CVE-2019-2422/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2426 page", "url": "https://www.suse.com/security/cve/CVE-2019-2426/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2602 page", "url": "https://www.suse.com/security/cve/CVE-2019-2602/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2684 page", "url": "https://www.suse.com/security/cve/CVE-2019-2684/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2698 page", "url": "https://www.suse.com/security/cve/CVE-2019-2698/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2745 page", "url": "https://www.suse.com/security/cve/CVE-2019-2745/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2762 page", "url": "https://www.suse.com/security/cve/CVE-2019-2762/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2766 page", "url": "https://www.suse.com/security/cve/CVE-2019-2766/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2769 page", "url": "https://www.suse.com/security/cve/CVE-2019-2769/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2786 page", "url": "https://www.suse.com/security/cve/CVE-2019-2786/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2816 page", "url": "https://www.suse.com/security/cve/CVE-2019-2816/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2842 page", "url": "https://www.suse.com/security/cve/CVE-2019-2842/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2894 page", "url": "https://www.suse.com/security/cve/CVE-2019-2894/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2933 page", "url": "https://www.suse.com/security/cve/CVE-2019-2933/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2945 page", "url": "https://www.suse.com/security/cve/CVE-2019-2945/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2949 page", "url": "https://www.suse.com/security/cve/CVE-2019-2949/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2958 page", "url": "https://www.suse.com/security/cve/CVE-2019-2958/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2962 page", "url": "https://www.suse.com/security/cve/CVE-2019-2962/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2964 page", "url": "https://www.suse.com/security/cve/CVE-2019-2964/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2973 page", "url": "https://www.suse.com/security/cve/CVE-2019-2973/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2975 page", "url": "https://www.suse.com/security/cve/CVE-2019-2975/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2978 page", "url": "https://www.suse.com/security/cve/CVE-2019-2978/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2981 page", "url": "https://www.suse.com/security/cve/CVE-2019-2981/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2983 page", "url": "https://www.suse.com/security/cve/CVE-2019-2983/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2987 page", "url": "https://www.suse.com/security/cve/CVE-2019-2987/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2988 page", "url": "https://www.suse.com/security/cve/CVE-2019-2988/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2989 page", "url": "https://www.suse.com/security/cve/CVE-2019-2989/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2992 page", "url": "https://www.suse.com/security/cve/CVE-2019-2992/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2999 page", "url": "https://www.suse.com/security/cve/CVE-2019-2999/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7317 page", "url": "https://www.suse.com/security/cve/CVE-2019-7317/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14556 page", "url": "https://www.suse.com/security/cve/CVE-2020-14556/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14577 page", "url": "https://www.suse.com/security/cve/CVE-2020-14577/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14578 page", "url": "https://www.suse.com/security/cve/CVE-2020-14578/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14579 page", "url": "https://www.suse.com/security/cve/CVE-2020-14579/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14581 page", "url": "https://www.suse.com/security/cve/CVE-2020-14581/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14583 page", "url": "https://www.suse.com/security/cve/CVE-2020-14583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14593 page", "url": "https://www.suse.com/security/cve/CVE-2020-14593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14621 page", "url": "https://www.suse.com/security/cve/CVE-2020-14621/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14779 page", "url": "https://www.suse.com/security/cve/CVE-2020-14779/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14781 page", "url": "https://www.suse.com/security/cve/CVE-2020-14781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14782 page", "url": "https://www.suse.com/security/cve/CVE-2020-14782/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14792 page", "url": "https://www.suse.com/security/cve/CVE-2020-14792/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14796 page", "url": "https://www.suse.com/security/cve/CVE-2020-14796/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14797 page", "url": "https://www.suse.com/security/cve/CVE-2020-14797/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14798 page", "url": "https://www.suse.com/security/cve/CVE-2020-14798/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14803 page", "url": "https://www.suse.com/security/cve/CVE-2020-14803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2583 page", "url": "https://www.suse.com/security/cve/CVE-2020-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2590 page", "url": "https://www.suse.com/security/cve/CVE-2020-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2593 page", "url": "https://www.suse.com/security/cve/CVE-2020-2593/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2601 page", "url": "https://www.suse.com/security/cve/CVE-2020-2601/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2604 page", "url": "https://www.suse.com/security/cve/CVE-2020-2604/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2654 page", "url": "https://www.suse.com/security/cve/CVE-2020-2654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2659 page", "url": "https://www.suse.com/security/cve/CVE-2020-2659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2754 page", "url": "https://www.suse.com/security/cve/CVE-2020-2754/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2755 page", "url": "https://www.suse.com/security/cve/CVE-2020-2755/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2756 page", "url": "https://www.suse.com/security/cve/CVE-2020-2756/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2757 page", "url": "https://www.suse.com/security/cve/CVE-2020-2757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2773 page", "url": "https://www.suse.com/security/cve/CVE-2020-2773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2781 page", "url": "https://www.suse.com/security/cve/CVE-2020-2781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2800 page", "url": "https://www.suse.com/security/cve/CVE-2020-2800/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2803 page", "url": "https://www.suse.com/security/cve/CVE-2020-2803/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2805 page", "url": "https://www.suse.com/security/cve/CVE-2020-2805/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2830 page", "url": "https://www.suse.com/security/cve/CVE-2020-2830/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2161 page", "url": "https://www.suse.com/security/cve/CVE-2021-2161/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2163 page", "url": "https://www.suse.com/security/cve/CVE-2021-2163/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2341 page", "url": "https://www.suse.com/security/cve/CVE-2021-2341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2369 page", "url": "https://www.suse.com/security/cve/CVE-2021-2369/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-2388 page", "url": "https://www.suse.com/security/cve/CVE-2021-2388/" } ], "title": "java-1_8_0-openjdk-1.8.0.302-2.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10876-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64" } }, { "category": "product_version", "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", "product": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", "product_id": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" }, "product_reference": "java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10165", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10165" } ], "notes": [ { "category": "general", "text": "The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10165", "url": "https://www.suse.com/security/cve/CVE-2016-10165" }, { "category": "external", "summary": "SUSE Bug 1021364 for CVE-2016-10165", "url": "https://bugzilla.suse.com/1021364" }, { "category": "external", "summary": "SUSE Bug 1064069 for CVE-2016-10165", "url": "https://bugzilla.suse.com/1064069" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2016-10165", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-10165" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-5546", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5546" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Integrity impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5546", "url": "https://www.suse.com/security/cve/CVE-2016-5546" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5546", "url": "https://bugzilla.suse.com/1020905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5546" }, { "cve": "CVE-2016-5547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5547" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5547", "url": "https://www.suse.com/security/cve/CVE-2016-5547" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5547", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5547", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5547" }, { "cve": "CVE-2016-5548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5548" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5548", "url": "https://www.suse.com/security/cve/CVE-2016-5548" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5548", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5548", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5548" }, { "cve": "CVE-2016-5549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5549" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 6.5 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5549", "url": "https://www.suse.com/security/cve/CVE-2016-5549" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5549", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5549", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5549" }, { "cve": "CVE-2016-5552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5552" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.3 (Integrity impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5552", "url": "https://www.suse.com/security/cve/CVE-2016-5552" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2016-5552", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-5552", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5552" }, { "cve": "CVE-2016-9840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9840" } ], "notes": [ { "category": "general", "text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9840", "url": "https://www.suse.com/security/cve/CVE-2016-9840" }, { "category": "external", "summary": "SUSE Bug 1003579 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1003579" }, { "category": "external", "summary": "SUSE Bug 1022633 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1022633" }, { "category": "external", "summary": "SUSE Bug 1023215 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1023215" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-9840" }, { "cve": "CVE-2016-9843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9843" } ], "notes": [ { "category": "general", "text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9843", "url": "https://www.suse.com/security/cve/CVE-2016-9843" }, { "category": "external", "summary": "SUSE Bug 1003580 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1003580" }, { "category": "external", "summary": "SUSE Bug 1013882 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1013882" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1116686 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1116686" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9843" }, { "cve": "CVE-2017-10053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10053" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10053", "url": "https://www.suse.com/security/cve/CVE-2017-10053" }, { "category": "external", "summary": "SUSE Bug 1049305 for CVE-2017-10053", "url": "https://bugzilla.suse.com/1049305" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10053" }, { "cve": "CVE-2017-10067", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10067" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10067", "url": "https://www.suse.com/security/cve/CVE-2017-10067" }, { "category": "external", "summary": "SUSE Bug 1049306 for CVE-2017-10067", "url": "https://bugzilla.suse.com/1049306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10067" }, { "cve": "CVE-2017-10074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10074" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10074", "url": "https://www.suse.com/security/cve/CVE-2017-10074" }, { "category": "external", "summary": "SUSE Bug 1049307 for CVE-2017-10074", "url": "https://bugzilla.suse.com/1049307" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10074", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10074" }, { "cve": "CVE-2017-10078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10078" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10078", "url": "https://www.suse.com/security/cve/CVE-2017-10078" }, { "category": "external", "summary": "SUSE Bug 1049308 for CVE-2017-10078", "url": "https://bugzilla.suse.com/1049308" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10078", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10078" }, { "cve": "CVE-2017-10081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10081" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10081", "url": "https://www.suse.com/security/cve/CVE-2017-10081" }, { "category": "external", "summary": "SUSE Bug 1049309 for CVE-2017-10081", "url": "https://bugzilla.suse.com/1049309" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10081", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10081" }, { "cve": "CVE-2017-10086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10086" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10086", "url": "https://www.suse.com/security/cve/CVE-2017-10086" }, { "category": "external", "summary": "SUSE Bug 1049310 for CVE-2017-10086", "url": "https://bugzilla.suse.com/1049310" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10086", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10086" }, { "cve": "CVE-2017-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10087" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10087", "url": "https://www.suse.com/security/cve/CVE-2017-10087" }, { "category": "external", "summary": "SUSE Bug 1049311 for CVE-2017-10087", "url": "https://bugzilla.suse.com/1049311" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10087", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10087" }, { "cve": "CVE-2017-10089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10089" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: ImageIO). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10089", "url": "https://www.suse.com/security/cve/CVE-2017-10089" }, { "category": "external", "summary": "SUSE Bug 1049312 for CVE-2017-10089", "url": "https://bugzilla.suse.com/1049312" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10089", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10089" }, { "cve": "CVE-2017-10090", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10090" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10090", "url": "https://www.suse.com/security/cve/CVE-2017-10090" }, { "category": "external", "summary": "SUSE Bug 1049313 for CVE-2017-10090", "url": "https://bugzilla.suse.com/1049313" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10090", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10090" }, { "cve": "CVE-2017-10096", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10096" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10096", "url": "https://www.suse.com/security/cve/CVE-2017-10096" }, { "category": "external", "summary": "SUSE Bug 1049314 for CVE-2017-10096", "url": "https://bugzilla.suse.com/1049314" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10096", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10096" }, { "cve": "CVE-2017-10101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10101" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10101", "url": "https://www.suse.com/security/cve/CVE-2017-10101" }, { "category": "external", "summary": "SUSE Bug 1049315 for CVE-2017-10101", "url": "https://bugzilla.suse.com/1049315" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10101", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10101" }, { "cve": "CVE-2017-10102", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10102" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10102", "url": "https://www.suse.com/security/cve/CVE-2017-10102" }, { "category": "external", "summary": "SUSE Bug 1049316 for CVE-2017-10102", "url": "https://bugzilla.suse.com/1049316" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10102", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10102" }, { "cve": "CVE-2017-10105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10105" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10105", "url": "https://www.suse.com/security/cve/CVE-2017-10105" }, { "category": "external", "summary": "SUSE Bug 1049317 for CVE-2017-10105", "url": "https://bugzilla.suse.com/1049317" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10105", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10105" }, { "cve": "CVE-2017-10107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10107" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10107", "url": "https://www.suse.com/security/cve/CVE-2017-10107" }, { "category": "external", "summary": "SUSE Bug 1049318 for CVE-2017-10107", "url": "https://bugzilla.suse.com/1049318" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10107", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-10107" }, { "cve": "CVE-2017-10108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10108" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10108", "url": "https://www.suse.com/security/cve/CVE-2017-10108" }, { "category": "external", "summary": "SUSE Bug 1049319 for CVE-2017-10108", "url": "https://bugzilla.suse.com/1049319" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10108", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10108" }, { "cve": "CVE-2017-10109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10109" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10109", "url": "https://www.suse.com/security/cve/CVE-2017-10109" }, { "category": "external", "summary": "SUSE Bug 1049320 for CVE-2017-10109", "url": "https://bugzilla.suse.com/1049320" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10109", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10109" }, { "cve": "CVE-2017-10110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10110" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10110", "url": "https://www.suse.com/security/cve/CVE-2017-10110" }, { "category": "external", "summary": "SUSE Bug 1049321 for CVE-2017-10110", "url": "https://bugzilla.suse.com/1049321" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10110", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10110" }, { "cve": "CVE-2017-10111", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10111" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 8u131; Java SE Embedded: 8u131. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10111", "url": "https://www.suse.com/security/cve/CVE-2017-10111" }, { "category": "external", "summary": "SUSE Bug 1049322 for CVE-2017-10111", "url": "https://bugzilla.suse.com/1049322" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10111", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10111" }, { "cve": "CVE-2017-10114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10114" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10114", "url": "https://www.suse.com/security/cve/CVE-2017-10114" }, { "category": "external", "summary": "SUSE Bug 1049323 for CVE-2017-10114", "url": "https://bugzilla.suse.com/1049323" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10114", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10114" }, { "cve": "CVE-2017-10115", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10115" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10115", "url": "https://www.suse.com/security/cve/CVE-2017-10115" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-10115", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1049324 for CVE-2017-10115", "url": "https://bugzilla.suse.com/1049324" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10115", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-10115" }, { "cve": "CVE-2017-10116", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10116" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10116", "url": "https://www.suse.com/security/cve/CVE-2017-10116" }, { "category": "external", "summary": "SUSE Bug 1049325 for CVE-2017-10116", "url": "https://bugzilla.suse.com/1049325" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10116", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10116" }, { "cve": "CVE-2017-10118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10118" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10118", "url": "https://www.suse.com/security/cve/CVE-2017-10118" }, { "category": "external", "summary": "SUSE Bug 1049326 for CVE-2017-10118", "url": "https://bugzilla.suse.com/1049326" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10118", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10118" }, { "cve": "CVE-2017-10125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10125" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 7u141 and 8u131. Difficult to exploit vulnerability allows physical access to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to deployment of Java where the Java Auto Update is enabled. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10125", "url": "https://www.suse.com/security/cve/CVE-2017-10125" }, { "category": "external", "summary": "SUSE Bug 1049327 for CVE-2017-10125", "url": "https://bugzilla.suse.com/1049327" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10125", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10125" }, { "cve": "CVE-2017-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10135" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10135", "url": "https://www.suse.com/security/cve/CVE-2017-10135" }, { "category": "external", "summary": "SUSE Bug 1049328 for CVE-2017-10135", "url": "https://bugzilla.suse.com/1049328" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10135", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10135" }, { "cve": "CVE-2017-10176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10176" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10176", "url": "https://www.suse.com/security/cve/CVE-2017-10176" }, { "category": "external", "summary": "SUSE Bug 1049329 for CVE-2017-10176", "url": "https://bugzilla.suse.com/1049329" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10176", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10176" }, { "cve": "CVE-2017-10193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10193" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10193", "url": "https://www.suse.com/security/cve/CVE-2017-10193" }, { "category": "external", "summary": "SUSE Bug 1049330 for CVE-2017-10193", "url": "https://bugzilla.suse.com/1049330" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10193", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-10193" }, { "cve": "CVE-2017-10198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10198" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10198", "url": "https://www.suse.com/security/cve/CVE-2017-10198" }, { "category": "external", "summary": "SUSE Bug 1049331 for CVE-2017-10198", "url": "https://bugzilla.suse.com/1049331" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10198", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10198" }, { "cve": "CVE-2017-10243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10243" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10243", "url": "https://www.suse.com/security/cve/CVE-2017-10243" }, { "category": "external", "summary": "SUSE Bug 1049332 for CVE-2017-10243", "url": "https://bugzilla.suse.com/1049332" }, { "category": "external", "summary": "SUSE Bug 1049333 for CVE-2017-10243", "url": "https://bugzilla.suse.com/1049333" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10243" }, { "cve": "CVE-2017-10274", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10274" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Smart Card IO). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10274", "url": "https://www.suse.com/security/cve/CVE-2017-10274" }, { "category": "external", "summary": "SUSE Bug 1064071 for CVE-2017-10274", "url": "https://bugzilla.suse.com/1064071" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10274" }, { "cve": "CVE-2017-10281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10281" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10281", "url": "https://www.suse.com/security/cve/CVE-2017-10281" }, { "category": "external", "summary": "SUSE Bug 1064072 for CVE-2017-10281", "url": "https://bugzilla.suse.com/1064072" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10281", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10281" }, { "cve": "CVE-2017-10285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10285" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10285", "url": "https://www.suse.com/security/cve/CVE-2017-10285" }, { "category": "external", "summary": "SUSE Bug 1064073 for CVE-2017-10285", "url": "https://bugzilla.suse.com/1064073" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10285", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10285" }, { "cve": "CVE-2017-10295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10295" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10295", "url": "https://www.suse.com/security/cve/CVE-2017-10295" }, { "category": "external", "summary": "SUSE Bug 1064075 for CVE-2017-10295", "url": "https://bugzilla.suse.com/1064075" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10295", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10295" }, { "cve": "CVE-2017-10345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10345" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10345", "url": "https://www.suse.com/security/cve/CVE-2017-10345" }, { "category": "external", "summary": "SUSE Bug 1064077 for CVE-2017-10345", "url": "https://bugzilla.suse.com/1064077" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10345", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-10345" }, { "cve": "CVE-2017-10346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10346" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10346", "url": "https://www.suse.com/security/cve/CVE-2017-10346" }, { "category": "external", "summary": "SUSE Bug 1064078 for CVE-2017-10346", "url": "https://bugzilla.suse.com/1064078" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10346", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-10346" }, { "cve": "CVE-2017-10347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10347" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10347", "url": "https://www.suse.com/security/cve/CVE-2017-10347" }, { "category": "external", "summary": "SUSE Bug 1064079 for CVE-2017-10347", "url": "https://bugzilla.suse.com/1064079" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10347", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10347" }, { "cve": "CVE-2017-10348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10348" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10348", "url": "https://www.suse.com/security/cve/CVE-2017-10348" }, { "category": "external", "summary": "SUSE Bug 1064080 for CVE-2017-10348", "url": "https://bugzilla.suse.com/1064080" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10348", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10348" }, { "cve": "CVE-2017-10349", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10349" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10349", "url": "https://www.suse.com/security/cve/CVE-2017-10349" }, { "category": "external", "summary": "SUSE Bug 1064081 for CVE-2017-10349", "url": "https://bugzilla.suse.com/1064081" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10349", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10349" }, { "cve": "CVE-2017-10350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10350" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JAX-WS). Supported versions that are affected are Java SE: 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10350", "url": "https://www.suse.com/security/cve/CVE-2017-10350" }, { "category": "external", "summary": "SUSE Bug 1064082 for CVE-2017-10350", "url": "https://bugzilla.suse.com/1064082" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10350", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10350" }, { "cve": "CVE-2017-10355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10355" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10355", "url": "https://www.suse.com/security/cve/CVE-2017-10355" }, { "category": "external", "summary": "SUSE Bug 1064083 for CVE-2017-10355", "url": "https://bugzilla.suse.com/1064083" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10355", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10355" }, { "cve": "CVE-2017-10356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10356" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10356", "url": "https://www.suse.com/security/cve/CVE-2017-10356" }, { "category": "external", "summary": "SUSE Bug 1064084 for CVE-2017-10356", "url": "https://bugzilla.suse.com/1064084" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10356", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10356" }, { "cve": "CVE-2017-10357", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10357" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10357", "url": "https://www.suse.com/security/cve/CVE-2017-10357" }, { "category": "external", "summary": "SUSE Bug 1064085 for CVE-2017-10357", "url": "https://bugzilla.suse.com/1064085" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10357", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10357" }, { "cve": "CVE-2017-10388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: Applies to the Java SE Kerberos client. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10388", "url": "https://www.suse.com/security/cve/CVE-2017-10388" }, { "category": "external", "summary": "SUSE Bug 1064086 for CVE-2017-10388", "url": "https://bugzilla.suse.com/1064086" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2017-10388", "url": "https://bugzilla.suse.com/1070162" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-10388" }, { "cve": "CVE-2017-3231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3231" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3231", "url": "https://www.suse.com/security/cve/CVE-2017-3231" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3231", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3231", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3231" }, { "cve": "CVE-2017-3241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3241" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS v3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3241", "url": "https://www.suse.com/security/cve/CVE-2017-3241" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3241", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3241", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2017-3241", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3241" }, { "cve": "CVE-2017-3252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3252" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAAS). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 5.8 (Integrity impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3252", "url": "https://www.suse.com/security/cve/CVE-2017-3252" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3252", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3252", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3252" }, { "cve": "CVE-2017-3253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3253" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111; JRockit: R28.3.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS v3.0 Base Score 7.5 (Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3253", "url": "https://www.suse.com/security/cve/CVE-2017-3253" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3253", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3253", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3253" }, { "cve": "CVE-2017-3260", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3260" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u121 and 8u112. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3260", "url": "https://www.suse.com/security/cve/CVE-2017-3260" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3260", "url": "https://bugzilla.suse.com/1020905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-3260" }, { "cve": "CVE-2017-3261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3261" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 4.3 (Confidentiality impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3261", "url": "https://www.suse.com/security/cve/CVE-2017-3261" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3261", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3261", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3261" }, { "cve": "CVE-2017-3272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3272" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u131, 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3272", "url": "https://www.suse.com/security/cve/CVE-2017-3272" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3272", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3272", "url": "https://bugzilla.suse.com/1024218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3272" }, { "cve": "CVE-2017-3289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3289" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u121 and 8u112; Java SE Embedded: 8u111. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS v3.0 Base Score 9.6 (Confidentiality, Integrity and Availability impacts).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3289", "url": "https://www.suse.com/security/cve/CVE-2017-3289" }, { "category": "external", "summary": "SUSE Bug 1020905 for CVE-2017-3289", "url": "https://bugzilla.suse.com/1020905" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2017-3289", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2017-3289", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.6, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-3289" }, { "cve": "CVE-2017-3509", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3509" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3509", "url": "https://www.suse.com/security/cve/CVE-2017-3509" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3509", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3509", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3509" }, { "cve": "CVE-2017-3511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3511" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3511", "url": "https://www.suse.com/security/cve/CVE-2017-3511" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3511", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3511", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3511" }, { "cve": "CVE-2017-3512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3512" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3512", "url": "https://www.suse.com/security/cve/CVE-2017-3512" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3512", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3512", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3512" }, { "cve": "CVE-2017-3514", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3514" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3514", "url": "https://www.suse.com/security/cve/CVE-2017-3514" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3514", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3514", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3514" }, { "cve": "CVE-2017-3526", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3526" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3526", "url": "https://www.suse.com/security/cve/CVE-2017-3526" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3526", "url": "https://bugzilla.suse.com/1034849" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3526" }, { "cve": "CVE-2017-3533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3533" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via FTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3533", "url": "https://www.suse.com/security/cve/CVE-2017-3533" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3533", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3533", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-3533" }, { "cve": "CVE-2017-3539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3539" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3539", "url": "https://www.suse.com/security/cve/CVE-2017-3539" }, { "category": "external", "summary": "SUSE Bug 1005522 for CVE-2017-3539", "url": "https://bugzilla.suse.com/1005522" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3539", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3539", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-3539" }, { "cve": "CVE-2017-3544", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3544" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u141, 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SMTP to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3544", "url": "https://www.suse.com/security/cve/CVE-2017-3544" }, { "category": "external", "summary": "SUSE Bug 1034849 for CVE-2017-3544", "url": "https://bugzilla.suse.com/1034849" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2017-3544", "url": "https://bugzilla.suse.com/1038505" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-3544" }, { "cve": "CVE-2018-11212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-11212" } ], "notes": [ { "category": "general", "text": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-11212", "url": "https://www.suse.com/security/cve/CVE-2018-11212" }, { "category": "external", "summary": "SUSE Bug 1122299 for CVE-2018-11212", "url": "https://bugzilla.suse.com/1122299" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-11212" }, { "cve": "CVE-2018-13785", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13785" } ], "notes": [ { "category": "general", "text": "In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13785", "url": "https://www.suse.com/security/cve/CVE-2018-13785" }, { "category": "external", "summary": "SUSE Bug 1100687 for CVE-2018-13785", "url": "https://bugzilla.suse.com/1100687" }, { "category": "external", "summary": "SUSE Bug 1112153 for CVE-2018-13785", "url": "https://bugzilla.suse.com/1112153" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-13785", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13785" }, { "cve": "CVE-2018-16435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16435" } ], "notes": [ { "category": "general", "text": "Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16435", "url": "https://www.suse.com/security/cve/CVE-2018-16435" }, { "category": "external", "summary": "SUSE Bug 1108813 for CVE-2018-16435", "url": "https://bugzilla.suse.com/1108813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16435" }, { "cve": "CVE-2018-2579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2579", "url": "https://www.suse.com/security/cve/CVE-2018-2579" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2579", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2579", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2579" }, { "cve": "CVE-2018-2582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2582" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2582", "url": "https://www.suse.com/security/cve/CVE-2018-2582" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2582", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2582", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2582" }, { "cve": "CVE-2018-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2588" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2588", "url": "https://www.suse.com/security/cve/CVE-2018-2588" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2588", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2588", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2588" }, { "cve": "CVE-2018-2599", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2599" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2599", "url": "https://www.suse.com/security/cve/CVE-2018-2599" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2599", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2599", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2599" }, { "cve": "CVE-2018-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2602", "url": "https://www.suse.com/security/cve/CVE-2018-2602" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2602", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2602", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2602" }, { "cve": "CVE-2018-2603", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2603" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2603", "url": "https://www.suse.com/security/cve/CVE-2018-2603" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2603", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2603", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2603" }, { "cve": "CVE-2018-2618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2618" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2618", "url": "https://www.suse.com/security/cve/CVE-2018-2618" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2618", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2618", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2618" }, { "cve": "CVE-2018-2629", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2629" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2629", "url": "https://www.suse.com/security/cve/CVE-2018-2629" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2629", "url": "https://bugzilla.suse.com/1076366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2629" }, { "cve": "CVE-2018-2633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2633" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2633", "url": "https://www.suse.com/security/cve/CVE-2018-2633" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2633", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2633", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2633" }, { "cve": "CVE-2018-2634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2634" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2634", "url": "https://www.suse.com/security/cve/CVE-2018-2634" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2634", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2634", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2634" }, { "cve": "CVE-2018-2637", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2637" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2637", "url": "https://www.suse.com/security/cve/CVE-2018-2637" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2637", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2637", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2637" }, { "cve": "CVE-2018-2641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2641" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 6.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2641", "url": "https://www.suse.com/security/cve/CVE-2018-2641" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2641", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2641", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2641" }, { "cve": "CVE-2018-2663", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2663" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2663", "url": "https://www.suse.com/security/cve/CVE-2018-2663" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2663", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2663", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2663" }, { "cve": "CVE-2018-2677", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2677" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2677", "url": "https://www.suse.com/security/cve/CVE-2018-2677" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2677", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2677", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2677" }, { "cve": "CVE-2018-2678", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2678" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2678", "url": "https://www.suse.com/security/cve/CVE-2018-2678" }, { "category": "external", "summary": "SUSE Bug 1076366 for CVE-2018-2678", "url": "https://bugzilla.suse.com/1076366" }, { "category": "external", "summary": "SUSE Bug 1082810 for CVE-2018-2678", "url": "https://bugzilla.suse.com/1082810" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2678" }, { "cve": "CVE-2018-2790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2790" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2790", "url": "https://www.suse.com/security/cve/CVE-2018-2790" }, { "category": "external", "summary": "SUSE Bug 1090023 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1090023" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1093311" }, { "category": "external", "summary": "SUSE Bug 1101637 for CVE-2018-2790", "url": "https://bugzilla.suse.com/1101637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-2790" }, { "cve": "CVE-2018-2794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2794" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2794", "url": "https://www.suse.com/security/cve/CVE-2018-2794" }, { "category": "external", "summary": "SUSE Bug 1090024 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1090024" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2794", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2794" }, { "cve": "CVE-2018-2795", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2795" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2795", "url": "https://www.suse.com/security/cve/CVE-2018-2795" }, { "category": "external", "summary": "SUSE Bug 1090025 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1090025" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2795", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2795" }, { "cve": "CVE-2018-2796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2796", "url": "https://www.suse.com/security/cve/CVE-2018-2796" }, { "category": "external", "summary": "SUSE Bug 1090026 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1090026" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2796", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2796" }, { "cve": "CVE-2018-2797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2797", "url": "https://www.suse.com/security/cve/CVE-2018-2797" }, { "category": "external", "summary": "SUSE Bug 1090027 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1090027" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2797", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2797" }, { "cve": "CVE-2018-2798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2798", "url": "https://www.suse.com/security/cve/CVE-2018-2798" }, { "category": "external", "summary": "SUSE Bug 1090028 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1090028" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2798", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2798" }, { "cve": "CVE-2018-2799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2799" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2799", "url": "https://www.suse.com/security/cve/CVE-2018-2799" }, { "category": "external", "summary": "SUSE Bug 1090029 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1090029" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2799", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2799" }, { "cve": "CVE-2018-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2800", "url": "https://www.suse.com/security/cve/CVE-2018-2800" }, { "category": "external", "summary": "SUSE Bug 1090030 for CVE-2018-2800", "url": "https://bugzilla.suse.com/1090030" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2800", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2800" }, { "cve": "CVE-2018-2814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2814" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2814", "url": "https://www.suse.com/security/cve/CVE-2018-2814" }, { "category": "external", "summary": "SUSE Bug 1090032 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1090032" }, { "category": "external", "summary": "SUSE Bug 1093311 for CVE-2018-2814", "url": "https://bugzilla.suse.com/1093311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2814" }, { "cve": "CVE-2018-2815", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2815" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2815", "url": "https://www.suse.com/security/cve/CVE-2018-2815" }, { "category": "external", "summary": "SUSE Bug 1090033 for CVE-2018-2815", "url": "https://bugzilla.suse.com/1090033" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2815" }, { "cve": "CVE-2018-2938", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2938" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2938", "url": "https://www.suse.com/security/cve/CVE-2018-2938" }, { "category": "external", "summary": "SUSE Bug 1101644 for CVE-2018-2938", "url": "https://bugzilla.suse.com/1101644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-2938" }, { "cve": "CVE-2018-2940", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2940" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2940", "url": "https://www.suse.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2940", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2940" }, { "cve": "CVE-2018-2952", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2952" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2952", "url": "https://www.suse.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101651 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101651" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2952", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2952" }, { "cve": "CVE-2018-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-2973", "url": "https://www.suse.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "SUSE Bug 1101645 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101645" }, { "category": "external", "summary": "SUSE Bug 1101656 for CVE-2018-2973", "url": "https://bugzilla.suse.com/1101656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-2973" }, { "cve": "CVE-2018-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3136" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.4 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3136", "url": "https://www.suse.com/security/cve/CVE-2018-3136" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3136", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3136" }, { "cve": "CVE-2018-3139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3139" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3139", "url": "https://www.suse.com/security/cve/CVE-2018-3139" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3139", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3139" }, { "cve": "CVE-2018-3149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3149" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3149", "url": "https://www.suse.com/security/cve/CVE-2018-3149" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3149", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3149" }, { "cve": "CVE-2018-3169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3169" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 7u191, 8u182 and 11; Java SE Embedded: 8u181. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g. code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3169", "url": "https://www.suse.com/security/cve/CVE-2018-3169" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3169", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3169" }, { "cve": "CVE-2018-3180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3180" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u201, 7u191, 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3180", "url": "https://www.suse.com/security/cve/CVE-2018-3180" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112147 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112147" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3180", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3180" }, { "cve": "CVE-2018-3183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3183" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Scripting). Supported versions that are affected are Java SE: 8u182 and 11; Java SE Embedded: 8u181; JRockit: R28.3.19. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3183", "url": "https://www.suse.com/security/cve/CVE-2018-3183" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1116574" }, { "category": "external", "summary": "SUSE Bug 1120714 for CVE-2018-3183", "url": "https://bugzilla.suse.com/1120714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-3183" }, { "cve": "CVE-2018-3214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3214" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Sound). Supported versions that are affected are Java SE: 6u201, 7u191 and 8u182; Java SE Embedded: 8u181; JRockit: R28.3.19. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g. through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3214", "url": "https://www.suse.com/security/cve/CVE-2018-3214" }, { "category": "external", "summary": "SUSE Bug 1112142 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112142" }, { "category": "external", "summary": "SUSE Bug 1112143 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112143" }, { "category": "external", "summary": "SUSE Bug 1112144 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112144" }, { "category": "external", "summary": "SUSE Bug 1112146 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112146" }, { "category": "external", "summary": "SUSE Bug 1112148 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112148" }, { "category": "external", "summary": "SUSE Bug 1112152 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1112152" }, { "category": "external", "summary": "SUSE Bug 1116574 for CVE-2018-3214", "url": "https://bugzilla.suse.com/1116574" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3214" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2019-2422", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2422" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2422", "url": "https://www.suse.com/security/cve/CVE-2019-2422" }, { "category": "external", "summary": "SUSE Bug 1122293 for CVE-2019-2422", "url": "https://bugzilla.suse.com/1122293" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2422" }, { "cve": "CVE-2019-2426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2426" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u201, 8u192 and 11.0.1; Java SE Embedded: 8u191. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2426", "url": "https://www.suse.com/security/cve/CVE-2019-2426" }, { "category": "external", "summary": "SUSE Bug 1134297 for CVE-2019-2426", "url": "https://bugzilla.suse.com/1134297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2426" }, { "cve": "CVE-2019-2602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2602" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2602", "url": "https://www.suse.com/security/cve/CVE-2019-2602" }, { "category": "external", "summary": "SUSE Bug 1132728 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1132728" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2602", "url": "https://bugzilla.suse.com/1134718" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2684" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 7u211, 8u202, 11.0.2 and 12; Java SE Embedded: 8u201. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2684", "url": "https://www.suse.com/security/cve/CVE-2019-2684" }, { "category": "external", "summary": "SUSE Bug 1132732 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1132732" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1184734 for CVE-2019-2684", "url": "https://bugzilla.suse.com/1184734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2698", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2698" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 7u211 and 8u202. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2698", "url": "https://www.suse.com/security/cve/CVE-2019-2698" }, { "category": "external", "summary": "SUSE Bug 1132729 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1132729" }, { "category": "external", "summary": "SUSE Bug 1134718 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1134718" }, { "category": "external", "summary": "SUSE Bug 1163365 for CVE-2019-2698", "url": "https://bugzilla.suse.com/1163365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2698" }, { "cve": "CVE-2019-2745", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2745" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u221, 8u212 and 11.0.3. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2745", "url": "https://www.suse.com/security/cve/CVE-2019-2745" }, { "category": "external", "summary": "SUSE Bug 1141784 for CVE-2019-2745", "url": "https://bugzilla.suse.com/1141784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2745" }, { "cve": "CVE-2019-2762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2762" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2762", "url": "https://www.suse.com/security/cve/CVE-2019-2762" }, { "category": "external", "summary": "SUSE Bug 1141782 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1141782" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2762", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2762" }, { "cve": "CVE-2019-2766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2766" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2766", "url": "https://www.suse.com/security/cve/CVE-2019-2766" }, { "category": "external", "summary": "SUSE Bug 1141789 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1141789" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2766", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2766" }, { "cve": "CVE-2019-2769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2769" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Utilities). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2769", "url": "https://www.suse.com/security/cve/CVE-2019-2769" }, { "category": "external", "summary": "SUSE Bug 1141783 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1141783" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2769", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2769" }, { "cve": "CVE-2019-2786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2786" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2786", "url": "https://www.suse.com/security/cve/CVE-2019-2786" }, { "category": "external", "summary": "SUSE Bug 1141787 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1141787" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2786", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2786" }, { "cve": "CVE-2019-2816", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2816" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 7u221, 8u212, 11.0.3 and 12.0.1; Java SE Embedded: 8u211. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2816", "url": "https://www.suse.com/security/cve/CVE-2019-2816" }, { "category": "external", "summary": "SUSE Bug 1141785 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1141785" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-2816", "url": "https://bugzilla.suse.com/1147021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2816" }, { "cve": "CVE-2019-2842", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2842" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JCE). The supported version that is affected is Java SE: 8u212. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2842", "url": "https://www.suse.com/security/cve/CVE-2019-2842" }, { "category": "external", "summary": "SUSE Bug 1141786 for CVE-2019-2842", "url": "https://bugzilla.suse.com/1141786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2842" }, { "cve": "CVE-2019-2894", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2894" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2894", "url": "https://www.suse.com/security/cve/CVE-2019-2894" }, { "category": "external", "summary": "SUSE Bug 1152856 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1152856" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2894", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2894" }, { "cve": "CVE-2019-2933", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2933" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2933", "url": "https://www.suse.com/security/cve/CVE-2019-2933" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2933", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2933" }, { "cve": "CVE-2019-2945", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2945" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2945", "url": "https://www.suse.com/security/cve/CVE-2019-2945" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2945", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2945" }, { "cve": "CVE-2019-2949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2949" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Kerberos). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2949", "url": "https://www.suse.com/security/cve/CVE-2019-2949" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2019-2949", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2949" }, { "cve": "CVE-2019-2958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2958" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2958", "url": "https://www.suse.com/security/cve/CVE-2019-2958" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2958", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2958" }, { "cve": "CVE-2019-2962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2962" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2962", "url": "https://www.suse.com/security/cve/CVE-2019-2962" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2962", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2962" }, { "cve": "CVE-2019-2964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2964" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2964", "url": "https://www.suse.com/security/cve/CVE-2019-2964" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2964", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2964" }, { "cve": "CVE-2019-2973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2973" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2973", "url": "https://www.suse.com/security/cve/CVE-2019-2973" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2973", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2973" }, { "cve": "CVE-2019-2975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2975" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2975", "url": "https://www.suse.com/security/cve/CVE-2019-2975" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2975", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2975" }, { "cve": "CVE-2019-2978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2978" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2978", "url": "https://www.suse.com/security/cve/CVE-2019-2978" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2978", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2978" }, { "cve": "CVE-2019-2981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2981" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2981", "url": "https://www.suse.com/security/cve/CVE-2019-2981" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2981", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2981" }, { "cve": "CVE-2019-2983", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2983" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2983", "url": "https://www.suse.com/security/cve/CVE-2019-2983" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2983", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2983" }, { "cve": "CVE-2019-2987", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2987" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2987", "url": "https://www.suse.com/security/cve/CVE-2019-2987" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2987", "url": "https://bugzilla.suse.com/1154212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2987" }, { "cve": "CVE-2019-2988", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2988" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2988", "url": "https://www.suse.com/security/cve/CVE-2019-2988" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2988", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2988" }, { "cve": "CVE-2019-2989", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2989" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 6.8 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2989", "url": "https://www.suse.com/security/cve/CVE-2019-2989" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2989", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2989" }, { "cve": "CVE-2019-2992", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2992" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2992", "url": "https://www.suse.com/security/cve/CVE-2019-2992" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2992", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2992" }, { "cve": "CVE-2019-2999", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2999" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Javadoc). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE accessible data as well as unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2999", "url": "https://www.suse.com/security/cve/CVE-2019-2999" }, { "category": "external", "summary": "SUSE Bug 1154212 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1154212" }, { "category": "external", "summary": "SUSE Bug 1158442 for CVE-2019-2999", "url": "https://bugzilla.suse.com/1158442" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-2999" }, { "cve": "CVE-2019-7317", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7317" } ], "notes": [ { "category": "general", "text": "png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7317", "url": "https://www.suse.com/security/cve/CVE-2019-7317" }, { "category": "external", "summary": "SUSE Bug 1124211 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1124211" }, { "category": "external", "summary": "SUSE Bug 1135824 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1135824" }, { "category": "external", "summary": "SUSE Bug 1141780 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1141780" }, { "category": "external", "summary": "SUSE Bug 1147021 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1147021" }, { "category": "external", "summary": "SUSE Bug 1165297 for CVE-2019-7317", "url": "https://bugzilla.suse.com/1165297" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7317" }, { "cve": "CVE-2020-14556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14556" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14556", "url": "https://www.suse.com/security/cve/CVE-2020-14556" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14556", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14556" }, { "cve": "CVE-2020-14577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14577" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14577", "url": "https://www.suse.com/security/cve/CVE-2020-14577" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14577", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14577" }, { "cve": "CVE-2020-14578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14578" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14578", "url": "https://www.suse.com/security/cve/CVE-2020-14578" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14578", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14578" }, { "cve": "CVE-2020-14579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14579" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261 and 8u251; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14579", "url": "https://www.suse.com/security/cve/CVE-2020-14579" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14579", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14579" }, { "cve": "CVE-2020-14581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14581" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14581", "url": "https://www.suse.com/security/cve/CVE-2020-14581" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14581", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14581" }, { "cve": "CVE-2020-14583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14583", "url": "https://www.suse.com/security/cve/CVE-2020-14583" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14583", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14583" }, { "cve": "CVE-2020-14593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14593", "url": "https://www.suse.com/security/cve/CVE-2020-14593" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14593", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14593" }, { "cve": "CVE-2020-14621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14621" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14621", "url": "https://www.suse.com/security/cve/CVE-2020-14621" }, { "category": "external", "summary": "SUSE Bug 1174157 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1174157" }, { "category": "external", "summary": "SUSE Bug 1175259 for CVE-2020-14621", "url": "https://bugzilla.suse.com/1175259" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14621" }, { "cve": "CVE-2020-14779", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14779" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14779", "url": "https://www.suse.com/security/cve/CVE-2020-14779" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14779", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14779" }, { "cve": "CVE-2020-14781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JNDI). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14781", "url": "https://www.suse.com/security/cve/CVE-2020-14781" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14781", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14781" }, { "cve": "CVE-2020-14782", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14782" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14782", "url": "https://www.suse.com/security/cve/CVE-2020-14782" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14782", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14782" }, { "cve": "CVE-2020-14792", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14792" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14792", "url": "https://www.suse.com/security/cve/CVE-2020-14792" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14792", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14792" }, { "cve": "CVE-2020-14796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14796" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14796", "url": "https://www.suse.com/security/cve/CVE-2020-14796" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14796", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14796" }, { "cve": "CVE-2020-14797", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14797" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14797", "url": "https://www.suse.com/security/cve/CVE-2020-14797" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14797", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14797" }, { "cve": "CVE-2020-14798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14798" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u271, 8u261, 11.0.8 and 15; Java SE Embedded: 8u261. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14798", "url": "https://www.suse.com/security/cve/CVE-2020-14798" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1180063 for CVE-2020-14798", "url": "https://bugzilla.suse.com/1180063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14798" }, { "cve": "CVE-2020-14803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 11.0.8 and 15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14803", "url": "https://www.suse.com/security/cve/CVE-2020-14803" }, { "category": "external", "summary": "SUSE Bug 1177943 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1177943" }, { "category": "external", "summary": "SUSE Bug 1181239 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1181239" }, { "category": "external", "summary": "SUSE Bug 1182186 for CVE-2020-14803", "url": "https://bugzilla.suse.com/1182186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-14803" }, { "cve": "CVE-2020-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2583" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2583", "url": "https://www.suse.com/security/cve/CVE-2020-2583" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2583", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2583" }, { "cve": "CVE-2020-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2590" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2590", "url": "https://www.suse.com/security/cve/CVE-2020-2590" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2590", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2590" }, { "cve": "CVE-2020-2593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2593" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2593", "url": "https://www.suse.com/security/cve/CVE-2020-2593" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2593", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2593" }, { "cve": "CVE-2020-2601", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2601" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2601", "url": "https://www.suse.com/security/cve/CVE-2020-2601" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2601", "url": "https://bugzilla.suse.com/1160968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2601" }, { "cve": "CVE-2020-2604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2604" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2604", "url": "https://www.suse.com/security/cve/CVE-2020-2604" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1162972" }, { "category": "external", "summary": "SUSE Bug 1165863 for CVE-2020-2604", "url": "https://bugzilla.suse.com/1165863" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2604" }, { "cve": "CVE-2020-2654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2654" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2654", "url": "https://www.suse.com/security/cve/CVE-2020-2654" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2654", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2654" }, { "cve": "CVE-2020-2659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2659" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u241 and 8u231; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2659", "url": "https://www.suse.com/security/cve/CVE-2020-2659" }, { "category": "external", "summary": "SUSE Bug 1160968 for CVE-2020-2659", "url": "https://bugzilla.suse.com/1160968" }, { "category": "external", "summary": "SUSE Bug 1162972 for CVE-2020-2659", "url": "https://bugzilla.suse.com/1162972" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2659" }, { "cve": "CVE-2020-2754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2754" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2754", "url": "https://www.suse.com/security/cve/CVE-2020-2754" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2754", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2754" }, { "cve": "CVE-2020-2755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2755" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Scripting). Supported versions that are affected are Java SE: 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2755", "url": "https://www.suse.com/security/cve/CVE-2020-2755" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2755", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2755" }, { "cve": "CVE-2020-2756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2756" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2756", "url": "https://www.suse.com/security/cve/CVE-2020-2756" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2756", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2756" }, { "cve": "CVE-2020-2757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2757" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2757", "url": "https://www.suse.com/security/cve/CVE-2020-2757" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2757", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2757" }, { "cve": "CVE-2020-2773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2773" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2773", "url": "https://www.suse.com/security/cve/CVE-2020-2773" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2773", "url": "https://bugzilla.suse.com/1169511" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2773" }, { "cve": "CVE-2020-2781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2781" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2781", "url": "https://www.suse.com/security/cve/CVE-2020-2781" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2781", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2781" }, { "cve": "CVE-2020-2800", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2800" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2800", "url": "https://www.suse.com/security/cve/CVE-2020-2800" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2800", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2800" }, { "cve": "CVE-2020-2803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2803" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2803", "url": "https://www.suse.com/security/cve/CVE-2020-2803" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2803", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2803" }, { "cve": "CVE-2020-2805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2805" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2805", "url": "https://www.suse.com/security/cve/CVE-2020-2805" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2805", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2805" }, { "cve": "CVE-2020-2830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2830" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2830", "url": "https://www.suse.com/security/cve/CVE-2020-2830" }, { "category": "external", "summary": "SUSE Bug 1169511 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1169511" }, { "category": "external", "summary": "SUSE Bug 1172277 for CVE-2020-2830", "url": "https://bugzilla.suse.com/1172277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-2830" }, { "cve": "CVE-2021-2161", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2161" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. It can also be exploited by supplying untrusted data to APIs in the specified Component. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2161", "url": "https://www.suse.com/security/cve/CVE-2021-2161" }, { "category": "external", "summary": "SUSE Bug 1185056 for CVE-2021-2161", "url": "https://bugzilla.suse.com/1185056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2161" }, { "cve": "CVE-2021-2163", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2163" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Java SE: 7u291, 8u281, 11.0.10, 16; Java SE Embedded: 8u281; Oracle GraalVM Enterprise Edition: 19.3.5, 20.3.1.2 and 21.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2163", "url": "https://www.suse.com/security/cve/CVE-2021-2163" }, { "category": "external", "summary": "SUSE Bug 1185055 for CVE-2021-2163", "url": "https://bugzilla.suse.com/1185055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2163" }, { "cve": "CVE-2021-2341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2341" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2341", "url": "https://www.suse.com/security/cve/CVE-2021-2341" }, { "category": "external", "summary": "SUSE Bug 1188564 for CVE-2021-2341", "url": "https://bugzilla.suse.com/1188564" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2341" }, { "cve": "CVE-2021-2369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2369" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Library). Supported versions that are affected are Java SE: 7u301, 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2369", "url": "https://www.suse.com/security/cve/CVE-2021-2369" }, { "category": "external", "summary": "SUSE Bug 1188565 for CVE-2021-2369", "url": "https://bugzilla.suse.com/1188565" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-2369" }, { "cve": "CVE-2021-2388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-2388" } ], "notes": [ { "category": "general", "text": "Vulnerability in the Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 8u291, 11.0.11, 16.0.1; Oracle GraalVM Enterprise Edition: 20.3.2 and 21.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-2388", "url": "https://www.suse.com/security/cve/CVE-2021-2388" }, { "category": "external", "summary": "SUSE Bug 1188566 for CVE-2021-2388", "url": "https://bugzilla.suse.com/1188566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-accessibility-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-demo-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-devel-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-headless-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-javadoc-1.8.0.302-2.2.x86_64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.aarch64", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.ppc64le", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.s390x", "openSUSE Tumbleweed:java-1_8_0-openjdk-src-1.8.0.302-2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-2388" } ] }
gsd-2018-11212
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-11212", "description": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "id": "GSD-2018-11212", "references": [ "https://www.suse.com/security/cve/CVE-2018-11212.html", "https://access.redhat.com/errata/RHSA-2019:2052", "https://access.redhat.com/errata/RHSA-2019:1238", "https://access.redhat.com/errata/RHSA-2019:0640", "https://access.redhat.com/errata/RHSA-2019:0474", "https://access.redhat.com/errata/RHSA-2019:0473", "https://access.redhat.com/errata/RHSA-2019:0472", "https://access.redhat.com/errata/RHSA-2019:0469", "https://ubuntu.com/security/CVE-2018-11212", "https://advisories.mageia.org/CVE-2018-11212.html", "https://alas.aws.amazon.com/cve/html/CVE-2018-11212.html", "https://linux.oracle.com/cve/CVE-2018-11212.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-11212" ], "details": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "id": "GSD-2018-11212", "modified": "2023-12-13T01:22:41.824537Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11212", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "106583", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106583" }, { "name": "USN-3706-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3706-2/" }, { "name": "RHSA-2019:0474", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "name": "USN-3706-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3706-1/" }, { "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1638-1] libjpeg-turbo security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "name": "RHSA-2019:0469", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "name": "RHSA-2019:0473", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "name": "RHSA-2019:0472", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "name": "openSUSE-SU-2019:0346", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "name": "RHSA-2019:0640", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "name": "RHSA-2019:1238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "name": "openSUSE-SU-2019:1439", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1500", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "name": "RHSA-2019:2052", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190118-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "name": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a", "refsource": "MISC", "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "name": "http://www.ijg.org/", "refsource": "MISC", "url": "http://www.ijg.org/" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "name": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git", "refsource": "MISC", "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ijg:libjpeg:9a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionStartIncluding": "7.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "versionStartIncluding": "9.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:8.0:update_191:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11212" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-369" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "name": "USN-3706-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3706-1/" }, { "name": "USN-3706-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3706-2/" }, { "name": "106583", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106583" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190118-0001/", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "name": "[debian-lts-announce] 20190122 [SECURITY] [DLA 1638-1] libjpeg-turbo security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "name": "RHSA-2019:0469", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "name": "RHSA-2019:0474", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "name": "RHSA-2019:0473", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "name": "RHSA-2019:0472", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "name": "openSUSE-SU-2019:0346", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "name": "RHSA-2019:0640", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "name": "RHSA-2019:1238", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "name": "openSUSE-SU-2019:1439", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1500", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "name": "RHSA-2019:2052", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us", "refsource": "CONFIRM", "tags": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "name": "http://www.ijg.org/", "refsource": "MISC", "tags": [], "url": "http://www.ijg.org/" }, { "name": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git", "refsource": "MISC", "tags": [], "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2022-04-20T00:15Z", "publishedDate": "2018-05-16T17:29Z" } } }
fkie_cve-2018-11212
Vulnerability from fkie_nvd
Published
2018-05-16 17:29
Modified
2024-11-21 03:42
Severity ?
Summary
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html | ||
cve@mitre.org | http://www.ijg.org/ | ||
cve@mitre.org | http://www.securityfocus.com/bid/106583 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0469 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0472 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0473 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0474 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:0640 | Third Party Advisory | |
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:1238 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2019:2052 | ||
cve@mitre.org | https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a | Exploit, Third Party Advisory | |
cve@mitre.org | https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git | ||
cve@mitre.org | https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20190118-0001/ | Patch, Third Party Advisory | |
cve@mitre.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us | ||
cve@mitre.org | https://usn.ubuntu.com/3706-1/ | Third Party Advisory | |
cve@mitre.org | https://usn.ubuntu.com/3706-2/ | Third Party Advisory | |
cve@mitre.org | https://www.oracle.com/security-alerts/cpuapr2022.html | ||
cve@mitre.org | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ijg.org/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106583 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0469 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0472 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0473 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0474 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:0640 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1238 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2052 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20190118-0001/ | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us | ||
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3706-1/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/3706-2/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2022.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ijg | libjpeg | 9a | |
debian | debian_linux | 8.0 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
netapp | oncommand_unified_manager | * | |
netapp | oncommand_unified_manager | * | |
netapp | oncommand_unified_manager | * | |
netapp | oncommand_workflow_automation | * | |
netapp | snapmanager | * | |
netapp | snapmanager | * | |
oracle | jdk | 1.7.0 | |
oracle | jdk | 1.8.0 | |
oracle | jdk | 11.0.1 | |
oracle | jre | 8.0 | |
redhat | satellite | 5.8 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
opensuse | leap | 15.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ijg:libjpeg:9a:*:*:*:*:*:*:*", "matchCriteriaId": "B75BB945-23D3-4242-8DD2-CECF91998F3B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBF1DFDA-FB66-4CEA-A658-B167326D1D96", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6AADE2A6-B78C-4B9C-8FAB-58DB50F69D84", "versionStartIncluding": "7.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B", "versionStartIncluding": "9.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:*:*:*:*:*:*:*:*", "matchCriteriaId": "93ADB707-E0A7-4650-AD0C-F28CA3FFC6BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:oracle:*:*", "matchCriteriaId": "1E46A02F-29C1-48C8-B9A5-8800F58CD785", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapmanager:*:*:*:*:*:sap:*:*", "matchCriteriaId": "D8668AF8-DA10-45F2-AB8C-432640D52C04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update201:*:*:*:*:*:*", "matchCriteriaId": "CE7DA784-1D92-4139-8336-75FDF68AC78D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update192:*:*:*:*:*:*", "matchCriteriaId": "97115EB3-5516-40D5-9BAA-FE7A3A2F55B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "931DCBC0-12A8-427E-8FBC-E88BCD91F52C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:8.0:update_191:*:*:*:*:*:*", "matchCriteriaId": "443B5461-681B-445E-B705-010012D4486F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "F4F86C3C-B99C-44C6-97D7-163DC3F59687", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file." }, { "lang": "es", "value": "Se ha descubierto un problema en libjpeg 9a y 9d. La funci\u00f3n alloc_sarray en jmemmgr.c permite que los atacantes remotos provoquen una denegaci\u00f3n de servicio (error de divisi\u00f3n entre cero) mediante un archivo manipulado." } ], "id": "CVE-2018-11212", "lastModified": "2024-11-21T03:42:54.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-16T17:29:00.230", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "source": "cve@mitre.org", "url": "http://www.ijg.org/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106583" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "source": "cve@mitre.org", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "source": "cve@mitre.org", "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "source": "cve@mitre.org", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3706-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3706-2/" }, { "source": "cve@mitre.org", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ijg.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190118-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3706-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3706-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-369" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2022-0517
Vulnerability from csaf_certbund
Published
2019-08-06 22:00
Modified
2025-06-23 22:00
Summary
Red Hat Enterprise Linux: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0517 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2022-0517.json" }, { "category": "self", "summary": "WID-SEC-2022-0517 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0517" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2332 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2332" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2336 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2336" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2308 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2308" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2285 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2285" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2290 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2290" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2280 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2280" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2283 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2283" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2272 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2272" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2276 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2276" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2258 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2258" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2229 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2229" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2237 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2237" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2196 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2196" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2197 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2197" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2189 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2189" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2177 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2177" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2178 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2178" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2162 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2162" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2157 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2157" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2137 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2137" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2125 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2125" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2126 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2126" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2112 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2112" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2101 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2101" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2075 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2075" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2049 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2049" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2052 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2047 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2047" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2048 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2048" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2035 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2035" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2037 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2037" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2017 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2017" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2437 vom 2019-08-12", "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2285 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2285.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2052 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2052.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2258 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2258.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2178 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2178.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2229 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2229.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2177 vom 2019-08-16", "url": "http://linux.oracle.com/errata/ELSA-2019-2177.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2283 vom 2019-08-19", "url": "http://linux.oracle.com/errata/ELSA-2019-2283.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2189 vom 2019-08-21", "url": "http://linux.oracle.com/errata/ELSA-2019-2189.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2280 vom 2019-08-21", "url": "http://linux.oracle.com/errata/ELSA-2019-2280.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2332 vom 2019-08-21", "url": "http://linux.oracle.com/errata/ELSA-2019-2332.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2267-1 vom 2019-09-02", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192267-1.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2019:2101 vom 2019-09-18", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2101-Low-CentOS-7-exiv2-Security-Update-tp4645686.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2019:2258 vom 2019-09-18", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2258-Moderate-CentOS-7-http-parser-Security-Update-tp4645679.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2730-1 vom 2019-10-22", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2750-1 vom 2019-10-23", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192750-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3338 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3338" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3651 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3651" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3575 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3575" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3583 vom 2019-11-06", "url": "https://access.redhat.com/errata/RHSA-2019:3583" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3590 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3590" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3345 vom 2019-11-06", "url": "https://access.redhat.com/errata/RHSA-2019:3345" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3497 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3497" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3335 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:3705 vom 2019-11-05", "url": "https://access.redhat.com/errata/RHSA-2019:3705" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2019-209 vom 2019-12-22", "url": "https://downloads.avaya.com/css/P8/documents/101060434" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2019-205 vom 2019-12-22", "url": "https://downloads.avaya.com/css/P8/documents/101060432" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0471 vom 2020-02-11", "url": "https://access.redhat.com/errata/RHSA-2020:0471" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2020:0471 vom 2020-02-11", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0471-Moderate-CentOS-6-spice-gtk-Security-Update-tp4645840.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0595 vom 2020-02-25", "url": "https://access.redhat.com/errata/RHSA-2020:0595" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:0555-1 vom 2020-03-02", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200555-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0850 vom 2020-03-17", "url": "https://access.redhat.com/errata/RHSA-2020:0850" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0851 vom 2020-03-17", "url": "https://access.redhat.com/errata/RHSA-2020:0851" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2020:0851 vom 2020-03-25", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0851-Moderate-CentOS-7-python-virtualenv-Security-Update-tp4645882.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2020:0850 vom 2020-03-25", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0850-Moderate-CentOS-7-python-pip-Security-Update-tp4645865.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1265 vom 2020-04-01", "url": "https://access.redhat.com/errata/RHSA-2020:1265" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:0921-1 vom 2020-04-04", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200921-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1471 vom 2020-04-14", "url": "https://access.redhat.com/errata/RHSA-2020:1471" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1464 vom 2020-04-14", "url": "https://access.redhat.com/errata/RHSA-2020:1464" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1461 vom 2020-04-14", "url": "https://access.redhat.com/errata/RHSA-2020:1461" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1577 vom 2020-04-28", "url": "https://access.redhat.com/errata/RHSA-2020:1577" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1916 vom 2020-04-28", "url": "https://access.redhat.com/errata/RHSA-2020:1916" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:1605 vom 2020-04-28", "url": "https://access.redhat.com/errata/RHSA-2020:1605" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2068 vom 2020-05-12", "url": "https://access.redhat.com/errata/RHSA-2020:2068" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:2081 vom 2020-05-12", "url": "https://access.redhat.com/errata/RHSA-2020:2081" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1792-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28", "url": "https://access.redhat.com/errata/RHSA-2020:3194" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2711-1 vom 2020-09-22", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2942-1 vom 2020-10-16", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007582.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:4999 vom 2020-11-10", "url": "https://access.redhat.com/errata/RHSA-2020:4999" }, { "category": "external", "summary": "Debian Security Advisory DLA-2470 vom 2020-12-01", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3842-1 vom 2020-12-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:3841-1 vom 2020-12-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" }, { "category": "external", "summary": "F5 Security Advisory K00409335 vom 2020-12-29", "url": "https://support.f5.com/csp/article/K00409335?utm_source=f5support\u0026utm_medium=RSS" }, { "category": "external", "summary": "Debian Security Advisory DLA-2645 vom 2021-04-29", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202107-15 vom 2021-07-08", "url": "https://www.cybersecurity-help.cz/vdb/SB2021070803" }, { "category": "external", "summary": "Debian Security Advisory DLA-2802 vom 2021-10-31", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1448-1 vom 2022-04-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1819-1 vom 2022-05-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5497-1 vom 2022-06-30", "url": "https://ubuntu.com/security/notices/USN-5497-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2614-1 vom 2022-08-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08", "url": "https://ubuntu.com/security/notices/USN-5553-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22", "url": "https://ubuntu.com/security/notices/USN-5631-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5671-1 vom 2022-10-12", "url": "https://ubuntu.com/security/notices/USN-5671-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4252-1 vom 2022-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1939 vom 2023-02-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1939.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-1940 vom 2023-02-22", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1940.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-6980 vom 2023-11-21", "url": "https://linux.oracle.com/errata/ELSA-2023-6980.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02", "url": "https://linux.oracle.com/errata/ELSA-2024-12605.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-253 vom 2025-06-24", "url": "https://www.dell.com/support/kbdoc/000335065" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-23T22:00:00.000+00:00", "generator": { "date": "2025-06-24T07:44:55.519+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2022-0517", "initial_release_date": "2019-08-06T22:00:00.000+00:00", "revision_history": [ { "date": "2019-08-06T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2019-08-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-13T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-18T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-19T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-21T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-09-02T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-09-18T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2019-10-09T22:00:00.000+00:00", "number": "9", "summary": "Referenz(en) aufgenommen: SUSE-SU-2019:1487-2" }, { "date": "2019-10-15T22:00:00.000+00:00", "number": "10", "summary": "Referenz(en) aufgenommen: FEDORA-2019-7B06F18A10, FEDORA-2019-A25D5DF3B4, FEDORA-2019-23638D42F3" }, { "date": "2019-10-21T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-10-23T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-11-05T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-01-30T23:00:00.000+00:00", "number": "15", "summary": "Referenz(en) aufgenommen: FEDORA-2020-CB7B7181A0, FEDORA-2020-1DFAA1963B" }, { "date": "2020-02-10T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-02-11T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2020-02-24T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-03-02T23:00:00.000+00:00", "number": "19", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-03-17T23:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-03-25T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2020-03-31T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-05T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-04-14T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-28T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-05-03T22:00:00.000+00:00", "number": "26", "summary": "Referenz(en) aufgenommen: USN-4349-1" }, { "date": "2020-05-12T22:00:00.000+00:00", "number": "27", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-06-28T22:00:00.000+00:00", "number": "28", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-07-28T22:00:00.000+00:00", "number": "29", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-09-22T22:00:00.000+00:00", "number": "30", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-10-18T22:00:00.000+00:00", "number": "31", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-11-09T23:00:00.000+00:00", "number": "32", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-11-30T23:00:00.000+00:00", "number": "33", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-12-16T23:00:00.000+00:00", "number": "34", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-12-28T23:00:00.000+00:00", "number": "35", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2021-04-29T22:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-07-07T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2021-09-08T22:00:00.000+00:00", "number": "38", "summary": "Referenz(en) aufgenommen: USN-5067-1" }, { "date": "2021-10-31T23:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-04-28T22:00:00.000+00:00", "number": "40", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-05-23T22:00:00.000+00:00", "number": "41", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-30T22:00:00.000+00:00", "number": "42", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "43", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "44", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-09-22T22:00:00.000+00:00", "number": "45", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-10-11T22:00:00.000+00:00", "number": "46", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "47", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-02-22T23:00:00.000+00:00", "number": "48", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "49", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-09-02T22:00:00.000+00:00", "number": "50", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "51", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "51" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "T40", "product": { "name": "Dell PowerEdge T40", "product_id": "T027537", "product_identification_helper": { "cpe": "cpe:/h:dell:poweredge:t40" } } } ], "category": "product_name", "name": "PowerEdge" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T006054", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3616", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2016-3616" }, { "cve": "CVE-2017-15111", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-15111" }, { "cve": "CVE-2017-15112", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-15112" }, { "cve": "CVE-2017-17724", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-17724" }, { "cve": "CVE-2017-18189", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-18189" }, { "cve": "CVE-2017-18233", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-18233" }, { "cve": "CVE-2017-18234", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-18234" }, { "cve": "CVE-2017-18236", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-18236" }, { "cve": "CVE-2017-18238", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-18238" }, { "cve": "CVE-2017-5731", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-5731" }, { "cve": "CVE-2017-5732", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-5732" }, { "cve": "CVE-2017-5733", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-5733" }, { "cve": "CVE-2017-5734", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-5734" }, { "cve": "CVE-2017-5735", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-5735" }, { "cve": "CVE-2017-6059", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-6059" }, { "cve": "CVE-2017-6413", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2017-6413" }, { "cve": "CVE-2018-0495", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-0495" }, { "cve": "CVE-2018-1000132", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-1000132" }, { "cve": "CVE-2018-1000852", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-1000852" }, { "cve": "CVE-2018-1000876", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-1000876" }, { "cve": "CVE-2018-10689", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-10689" }, { "cve": "CVE-2018-10772", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-10772" }, { "cve": "CVE-2018-10893", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-10893" }, { "cve": "CVE-2018-10958", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-10958" }, { "cve": "CVE-2018-10998", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-10998" }, { "cve": "CVE-2018-11037", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-11037" }, { "cve": "CVE-2018-11212", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-11212" }, { "cve": "CVE-2018-11213", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-11213" }, { "cve": "CVE-2018-11214", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-11214" }, { "cve": "CVE-2018-1122", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-1122" }, { "cve": "CVE-2018-11813", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-11813" }, { "cve": "CVE-2018-12121", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12121" }, { "cve": "CVE-2018-12181", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12181" }, { "cve": "CVE-2018-12264", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12264" }, { "cve": "CVE-2018-12265", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12265" }, { "cve": "CVE-2018-12404", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12404" }, { "cve": "CVE-2018-12641", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12641" }, { "cve": "CVE-2018-12697", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-12697" }, { "cve": "CVE-2018-13259", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-13259" }, { "cve": "CVE-2018-13346", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-13346" }, { "cve": "CVE-2018-13347", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-13347" }, { "cve": "CVE-2018-14046", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-14046" }, { "cve": "CVE-2018-14348", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-14348" }, { "cve": "CVE-2018-14498", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-14498" }, { "cve": "CVE-2018-16062", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-16062" }, { "cve": "CVE-2018-16402", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-16402" }, { "cve": "CVE-2018-16403", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-16403" }, { "cve": "CVE-2018-16548", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-16548" }, { "cve": "CVE-2018-16838", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-16838" }, { "cve": "CVE-2018-17282", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-17282" }, { "cve": "CVE-2018-17336", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-17336" }, { "cve": "CVE-2018-17581", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-17581" }, { "cve": "CVE-2018-18074", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18074" }, { "cve": "CVE-2018-18310", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18310" }, { "cve": "CVE-2018-18520", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18520" }, { "cve": "CVE-2018-18521", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18521" }, { "cve": "CVE-2018-18584", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18584" }, { "cve": "CVE-2018-18585", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18585" }, { "cve": "CVE-2018-18915", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-18915" }, { "cve": "CVE-2018-19044", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19044" }, { "cve": "CVE-2018-19107", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19107" }, { "cve": "CVE-2018-19108", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19108" }, { "cve": "CVE-2018-19198", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19198" }, { "cve": "CVE-2018-19199", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19199" }, { "cve": "CVE-2018-19208", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19208" }, { "cve": "CVE-2018-19535", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19535" }, { "cve": "CVE-2018-19607", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-19607" }, { "cve": "CVE-2018-20060", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20060" }, { "cve": "CVE-2018-20096", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20096" }, { "cve": "CVE-2018-20097", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20097" }, { "cve": "CVE-2018-20098", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20098" }, { "cve": "CVE-2018-20099", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20099" }, { "cve": "CVE-2018-20532", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20532" }, { "cve": "CVE-2018-20533", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20533" }, { "cve": "CVE-2018-20534", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-20534" }, { "cve": "CVE-2018-3613", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-3613" }, { "cve": "CVE-2018-5407", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-5407" }, { "cve": "CVE-2018-6541", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-6541" }, { "cve": "CVE-2018-7159", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-7159" }, { "cve": "CVE-2018-7409", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-7409" }, { "cve": "CVE-2018-7485", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-7485" }, { "cve": "CVE-2018-7730", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-7730" }, { "cve": "CVE-2018-8976", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-8976" }, { "cve": "CVE-2018-8977", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-8977" }, { "cve": "CVE-2018-9305", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2018-9305" }, { "cve": "CVE-2019-0160", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-0160" }, { "cve": "CVE-2019-0161", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-0161" }, { "cve": "CVE-2019-10153", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-10153" }, { "cve": "CVE-2019-10192", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-10192" }, { "cve": "CVE-2019-10193", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-10193" }, { "cve": "CVE-2019-11236", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-11236" }, { "cve": "CVE-2019-3811", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-3811" }, { "cve": "CVE-2019-7149", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-7149" }, { "cve": "CVE-2019-7150", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-7150" }, { "cve": "CVE-2019-7664", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-7664" }, { "cve": "CVE-2019-7665", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-7665" }, { "cve": "CVE-2019-8379", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-8379" }, { "cve": "CVE-2019-8383", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-8383" }, { "cve": "CVE-2019-9755", "product_status": { "known_affected": [ "2951", "T002207", "T000126", "T027537", "T001663", "398363", "T012167", "1727", "T004914", "T006054" ] }, "release_date": "2019-08-06T22:00:00.000+00:00", "title": "CVE-2019-9755" } ] }
wid-sec-w-2024-2180
Vulnerability from csaf_certbund
Published
2022-04-19 22:00
Modified
2024-09-18 22:00
Summary
Oracle Fusion Middleware: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Fusion Middleware bündelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.
Angriff
Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2180 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2024-2180.json" }, { "category": "self", "summary": "WID-SEC-2024-2180 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2180" }, { "category": "external", "summary": "Oracle Critical Patch Update April 2022 - Appendix Oracle Fusion Middleware vom 2022-04-19", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixFMW" }, { "category": "external", "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2024-09-18", "url": "https://www.cisa.gov/news-events/alerts/2024/09/18/cisa-adds-five-known-exploited-vulnerabilities-catalog" } ], "source_lang": "en-US", "title": "Oracle Fusion Middleware: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-09-18T22:00:00.000+00:00", "generator": { "date": "2024-09-19T08:06:58.739+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-2180", "initial_release_date": "2022-04-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-04-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-18T22:00:00.000+00:00", "number": "2", "summary": "Aktive Ausnutzung gemeldet" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "11.1.1.5.0", "product": { "name": "Oracle Fusion Middleware 11.1.1.5.0", "product_id": "150102", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:11.1.1.5.0" } } }, { "category": "product_version", "name": "12.2.1.3.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.3.0", "product_id": "618028", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.3.0" } } }, { "category": "product_version", "name": "12.2.1.4.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.4.0", "product_id": "751674", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0" } } }, { "category": "product_version", "name": "14.1.1.0.0", "product": { "name": "Oracle Fusion Middleware 14.1.1.0.0", "product_id": "829576", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0" } } }, { "category": "product_version", "name": "5.5.0.0.0", "product": { "name": "Oracle Fusion Middleware 5.5.0.0.0", "product_id": "T018990", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:5.5.0.0.0" } } }, { "category": "product_version", "name": "8.5.5", "product": { "name": "Oracle Fusion Middleware 8.5.5", "product_id": "T018991", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.5" } } }, { "category": "product_version", "name": "5.9.0.0.0", "product": { "name": "Oracle Fusion Middleware 5.9.0.0.0", "product_id": "T021683", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:5.9.0.0.0" } } }, { "category": "product_version", "name": "12.2.2.0.0", "product": { "name": "Oracle Fusion Middleware 12.2.2.0.0", "product_id": "T022845", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.2.0.0" } } }, { "category": "product_version", "name": "1.4.10", "product": { "name": "Oracle Fusion Middleware 1.4.10", "product_id": "T022846", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:1.4.10" } } }, { "category": "product_version", "name": "9.1.0", "product": { "name": "Oracle Fusion Middleware 9.1.0", "product_id": "T022847", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:9.1.0" } } }, { "category": "product_version", "name": "2.4.0", "product": { "name": "Oracle Fusion Middleware 2.4.0", "product_id": "T022848", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:2.4.0" } } }, { "category": "product_version", "name": "1.4.7", "product": { "name": "Oracle Fusion Middleware 1.4.7", "product_id": "T022849", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:1.4.7" } } }, { "category": "product_version", "name": "2.2.0", "product": { "name": "Oracle Fusion Middleware 2.2.0", "product_id": "T022850", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:2.2.0" } } }, { "category": "product_version_range", "name": "\u003c=RC1", "product": { "name": "Oracle Fusion Middleware \u003c=RC1", "product_id": "T022915" } }, { "category": "product_version_range", "name": "\u003c=RC1", "product": { "name": "Oracle Fusion Middleware \u003c=RC1", "product_id": "T022915-fixed" } } ], "category": "product_name", "name": "Fusion Middleware" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-11212", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2018-11212" }, { "cve": "CVE-2019-0227", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2019-0227" }, { "cve": "CVE-2020-17521", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2020-17521" }, { "cve": "CVE-2020-24977", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2020-24977" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-7226", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2020-7226" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-28170", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-28170" }, { "cve": "CVE-2021-28657", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-28657" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30129", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-30129" }, { "cve": "CVE-2021-31812", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-31812" }, { "cve": "CVE-2021-33037", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-33037" }, { "cve": "CVE-2021-36090", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-36090" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37714", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-37714" }, { "cve": "CVE-2021-39275", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-39275" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41165", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-41165" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44224", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-44224" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2021-44832" }, { "cve": "CVE-2022-21404", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21404" }, { "cve": "CVE-2022-21419", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21419" }, { "cve": "CVE-2022-21420", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21420" }, { "cve": "CVE-2022-21421", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21421" }, { "cve": "CVE-2022-21441", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21441" }, { "cve": "CVE-2022-21445", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21445" }, { "cve": "CVE-2022-21448", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21448" }, { "cve": "CVE-2022-21453", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21453" }, { "cve": "CVE-2022-21492", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21492" }, { "cve": "CVE-2022-21497", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-21497" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder lokaler Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "618028", "T022848", "T018990", "T022849", "T018991", "T022845", "T022846", "T022847", "150102", "T022850", "751674", "T021683", "829576" ], "last_affected": [ "T022915" ] }, "release_date": "2022-04-19T22:00:00.000+00:00", "title": "CVE-2022-23437" } ] }
ghsa-m7r9-q69w-q556
Vulnerability from github
Published
2022-05-13 01:01
Modified
2022-05-13 01:01
Severity ?
VLAI Severity ?
Details
An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.
{ "affected": [], "aliases": [ "CVE-2018-11212" ], "database_specific": { "cwe_ids": [ "CWE-369" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-16T17:29:00Z", "severity": "MODERATE" }, "details": "An issue was discovered in libjpeg 9a and 9d. The alloc_sarray function in jmemmgr.c allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted file.", "id": "GHSA-m7r9-q69w-q556", "modified": "2022-05-13T01:01:02Z", "published": "2022-05-13T01:01:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11212" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3706-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3706-1" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbst03958en_us" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20190118-0001" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/01/msg00015.html" }, { "type": "WEB", "url": "https://github.com/zzyyrr/divide-by-zero-in-libjpeg-9d.git" }, { "type": "WEB", "url": "https://github.com/ChijinZ/security_advisories/tree/master/libjpeg-v9a" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:2052" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:1238" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0640" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0474" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0473" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0472" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:0469" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html" }, { "type": "WEB", "url": "http://www.ijg.org" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106583" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…